Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe
Resource
win10v2004-20220812-en
General
-
Target
1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe
-
Size
30KB
-
MD5
dd351c87f249a95f278469ef3f58e6cf
-
SHA1
86ba7a82a92687bc37ba021b0c339ce2d11cbac0
-
SHA256
1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7
-
SHA512
24b2c9d5ddbd69425401d8c713d5970a96d2b7bb23c0222f498d344f495ef0331c232483275c09b47e6311fb1c3b1a394748e76c9993591acb5c0dc8b3ecc7a6
-
SSDEEP
384:QlC2Em7FELdqs00Lo9AHpFUHChr/h8JrGMsPu/+3XKD6peRC8UwDQIF7hDnB6PQG:gCT54sxgA/UHUr/uxw5p6kf0hDnBga
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LanmanServer\Parameters\ServiceDll = "C:\\Windows\\system32\\lld.cvsvres" reg.exe -
Loads dropped DLL 2 IoCs
pid Process 2160 rundll32.exe 2160 rundll32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\msws.dll 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe File opened for modification C:\Windows\SysWOW64\msws.dll 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe File created C:\Windows\SysWOW64\Driver.inf 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe File created C:\Windows\SysWOW64\lld.cvsvres 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe File opened for modification C:\Windows\SysWOW64\lld.cvsvres 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2108 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3644 wrote to memory of 4392 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 79 PID 3644 wrote to memory of 4392 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 79 PID 3644 wrote to memory of 4392 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 79 PID 3644 wrote to memory of 392 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 80 PID 3644 wrote to memory of 392 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 80 PID 3644 wrote to memory of 392 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 80 PID 3644 wrote to memory of 2108 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 83 PID 3644 wrote to memory of 2108 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 83 PID 3644 wrote to memory of 2108 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 83 PID 3644 wrote to memory of 2160 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 86 PID 3644 wrote to memory of 2160 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 86 PID 3644 wrote to memory of 2160 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 86 PID 3644 wrote to memory of 2272 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 87 PID 3644 wrote to memory of 2272 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 87 PID 3644 wrote to memory of 2272 3644 1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe"C:\Users\Admin\AppData\Local\Temp\1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver" /v DelayedAutoStart /t REG_DWORD /d 0 /f2⤵PID:4392
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d C:\Windows\system32\lld.cvsvres /f2⤵
- Sets DLL path for service in the registry
PID:392
-
-
C:\Windows\SysWOW64\sc.exesc config lanmanserver start= auto2⤵
- Launches sc.exe
PID:2108
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\lld.cvsvres StartUpA2⤵
- Loads dropped DLL
PID:2160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\1941d9aa0326be385466758e6267110435a121ee709b4e347d23b8d7055adfc7.exe2⤵PID:2272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD59e941155a4ed04d67c1e0fc6d59b6448
SHA16a3959a5e67c19a3abe46495f9ef7d63c403b005
SHA25660575ecc6610da5545819d308d4f64a027da2e4324059a7b5dbd169ff21eedcf
SHA51238b2ebb7c7610a10d6c15ccf1b6f36a41ae36bca1835e2ff1a78d540009d8de4d90a3bcee59739476391419f0dc9717bdeddc7beace3ed05277b10df75ef1001
-
Filesize
24KB
MD5ebf107ca54ee1e13907516b81744f929
SHA11473a3d525f2450bf12e5c0c3d9f5dbc24ea2e7d
SHA25604eac5cf76c27e20eb334e5f2a92020e2a0a6f2e43d66043c840b61726ae65ae
SHA5127e128862c5915f9aaf750c7957dadc17422350ca88cc0aec2de262953ff36e5ee0cd80c705c7e3573a38706e2060e5a15a15197877d625300323962232333983
-
Filesize
24KB
MD5ebf107ca54ee1e13907516b81744f929
SHA11473a3d525f2450bf12e5c0c3d9f5dbc24ea2e7d
SHA25604eac5cf76c27e20eb334e5f2a92020e2a0a6f2e43d66043c840b61726ae65ae
SHA5127e128862c5915f9aaf750c7957dadc17422350ca88cc0aec2de262953ff36e5ee0cd80c705c7e3573a38706e2060e5a15a15197877d625300323962232333983
-
Filesize
388KB
MD58d7db101a7211fe3309dc4dc8cf2dd0a
SHA16c2781eadf53b3742d16dab2f164baf813f7ac85
SHA25693db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a
SHA5128b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83
-
Filesize
388KB
MD58d7db101a7211fe3309dc4dc8cf2dd0a
SHA16c2781eadf53b3742d16dab2f164baf813f7ac85
SHA25693db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a
SHA5128b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83