Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
225s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
calc/calc/lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
calc/calc/lpk.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
calc/calc/奖金计算器.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
calc/calc/奖金计算器.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
calc/calc/如果无法运行,请先安装.NET Framework.url
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
calc/calc/如果无法运行,请先安装.NET Framework.url
Resource
win10v2004-20221111-en
General
-
Target
calc/calc/lpk.dll
-
Size
46KB
-
MD5
77774d76e724ae9017bac8609947899c
-
SHA1
efd281c15cc901fee9c64f88fd0b74eb1fa82b57
-
SHA256
2017c37d13d1c5475cb1532f06a87ae60b1b5852a405a2b6c24d881efe7aba08
-
SHA512
68d88ff7c3e130f2ac25e73ba92398dd2b8a6dba26980395996ed6c8e7a4a404de30ce40f9819925afe55040c8f69e6461b7f8349d8de5f2ccdf19116407699f
-
SSDEEP
768:IUWUAohfjiT5ediDgEYe5eWomHEo2fKEFCLxu5qr7Ho73UEWkGpIfxMC:10qfWT5MbEYme9aLMBCVuEXID3x+C
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1104 hrl1575.tmp 2016 zgxdcg.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/files/0x000c0000000054a8-57.dat upx behavioral1/files/0x000c0000000054a8-59.dat upx behavioral1/files/0x000c0000000054a8-60.dat upx behavioral1/files/0x000b00000001232e-61.dat upx behavioral1/memory/1104-62-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2016-63-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/files/0x000b00000001232e-64.dat upx behavioral1/memory/2016-67-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 936 rundll32.exe 936 rundll32.exe 2016 zgxdcg.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: zgxdcg.exe File opened (read-only) \??\V: zgxdcg.exe File opened (read-only) \??\M: zgxdcg.exe File opened (read-only) \??\O: zgxdcg.exe File opened (read-only) \??\T: zgxdcg.exe File opened (read-only) \??\U: zgxdcg.exe File opened (read-only) \??\Z: zgxdcg.exe File opened (read-only) \??\H: zgxdcg.exe File opened (read-only) \??\J: zgxdcg.exe File opened (read-only) \??\L: zgxdcg.exe File opened (read-only) \??\I: zgxdcg.exe File opened (read-only) \??\K: zgxdcg.exe File opened (read-only) \??\P: zgxdcg.exe File opened (read-only) \??\Q: zgxdcg.exe File opened (read-only) \??\E: zgxdcg.exe File opened (read-only) \??\F: zgxdcg.exe File opened (read-only) \??\G: zgxdcg.exe File opened (read-only) \??\X: zgxdcg.exe File opened (read-only) \??\Y: zgxdcg.exe File opened (read-only) \??\R: zgxdcg.exe File opened (read-only) \??\S: zgxdcg.exe File opened (read-only) \??\W: zgxdcg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\zgxdcg.exe hrl1575.tmp File opened for modification C:\Windows\SysWOW64\zgxdcg.exe hrl1575.tmp File created C:\Windows\SysWOW64\gei33.dll zgxdcg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\7-Zip\lpk.dll zgxdcg.exe File opened for modification C:\Program Files\7-Zip\lpk.dll zgxdcg.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 980 wrote to memory of 936 980 rundll32.exe 28 PID 980 wrote to memory of 936 980 rundll32.exe 28 PID 980 wrote to memory of 936 980 rundll32.exe 28 PID 980 wrote to memory of 936 980 rundll32.exe 28 PID 980 wrote to memory of 936 980 rundll32.exe 28 PID 980 wrote to memory of 936 980 rundll32.exe 28 PID 980 wrote to memory of 936 980 rundll32.exe 28 PID 936 wrote to memory of 1104 936 rundll32.exe 29 PID 936 wrote to memory of 1104 936 rundll32.exe 29 PID 936 wrote to memory of 1104 936 rundll32.exe 29 PID 936 wrote to memory of 1104 936 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\calc\calc\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\calc\calc\lpk.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\hrl1575.tmpC:\Users\Admin\AppData\Local\Temp\hrl1575.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1104
-
-
-
C:\Windows\SysWOW64\zgxdcg.exeC:\Windows\SysWOW64\zgxdcg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
46KB
MD577774d76e724ae9017bac8609947899c
SHA1efd281c15cc901fee9c64f88fd0b74eb1fa82b57
SHA2562017c37d13d1c5475cb1532f06a87ae60b1b5852a405a2b6c24d881efe7aba08
SHA51268d88ff7c3e130f2ac25e73ba92398dd2b8a6dba26980395996ed6c8e7a4a404de30ce40f9819925afe55040c8f69e6461b7f8349d8de5f2ccdf19116407699f