Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2025, 20:16

General

  • Target

    $PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll

  • Size

    2.7MB

  • MD5

    9929bf8efb3087a1a832fc09ac97bef4

  • SHA1

    4df24505648dec56488d68cd1ce5265c4c31e5bb

  • SHA256

    2867243b3b6584986098d5e5f921f2dff5dfe5fe605725b263371bc8ff3fa279

  • SHA512

    a172e659ac803bf8ed260af80caf6e94ab076e6759a8f77e30e0cf8dd99fb0db690db7b0656bfeb3bae324082665d6ca219d775591df988f90be0d5633054cdb

  • SSDEEP

    49152:5WiPPqsRfBqN7+PBHWNUhDGJRmO+HJT99zxy+BQ9AwiTgTnklMV:5W+qsdBqN7+PBHWNUyJRDw9EUQ9Au

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$PROGRAM_FILES\Baidu\Toolbar\BaiduBarX_Tmp\BaiduBarX.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$PROGRAM_FILES\Baidu\Toolbar\BaiduBarX_Tmp\BaiduBarX.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Program Files (x86)\Baidu\Toolbar\BarBroker.exe
        "C:\Program Files (x86)\Baidu\Toolbar\BarBroker.exe" -RegServer
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files (x86)\Baidu\Toolbar\BaiduBarX.dll

    Filesize

    2.7MB

    MD5

    9929bf8efb3087a1a832fc09ac97bef4

    SHA1

    4df24505648dec56488d68cd1ce5265c4c31e5bb

    SHA256

    2867243b3b6584986098d5e5f921f2dff5dfe5fe605725b263371bc8ff3fa279

    SHA512

    a172e659ac803bf8ed260af80caf6e94ab076e6759a8f77e30e0cf8dd99fb0db690db7b0656bfeb3bae324082665d6ca219d775591df988f90be0d5633054cdb

  • \Program Files (x86)\Baidu\Toolbar\BarBroker.exe

    Filesize

    232KB

    MD5

    6b224c78c4b3433e754676dfab012142

    SHA1

    0ef3ad9248de0f4cef24ff110c87157c8433cc83

    SHA256

    567ea2b8aee289f74b5affd5ff6e22ca0fd68d03071670ae060359fc5dae2e88

    SHA512

    9561fa4efe992781a5692c7da7eb9b765668b7592f41417c3de9e1841f8e85f6dfc3fcd0233842489da54157c81c31211123bda45798539efa696f8cae6149d7

  • \Program Files (x86)\Baidu\Toolbar\rc.dll

    Filesize

    496KB

    MD5

    51e4f617d2ad241171f437001565ac71

    SHA1

    1af01b7428e3493825451980e25306941ca50e31

    SHA256

    ca30dd00c9586efc075376c4b53fdcc2dcee6c1ad3ee83eb8f801e95d1dd250a

    SHA512

    93044c79020a710dc85a848fef030084b41e12334492e7a11973107c7d79e352c1ea7b9f8fc0f116d5fce341cb6d3317acd4fa8fb5396765cc3724773f571e6f

  • memory/2132-2-0x0000000002870000-0x0000000002B25000-memory.dmp

    Filesize

    2.7MB

  • memory/2132-9-0x0000000002310000-0x000000000238C000-memory.dmp

    Filesize

    496KB