Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
180s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
T8830第三方Recovery/使用说明.url
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
T8830第三方Recovery/使用说明.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
lpk.dll
Resource
win10v2004-20221111-en
General
-
Target
lpk.dll
-
Size
85KB
-
MD5
8f114be9125798a2e24ab55fafb09590
-
SHA1
aa070d571279542fe8c06a16f06afe6945d28d6e
-
SHA256
9a542bd4f4349030fcb8c557ce997be76a8f12c2bcf38a03dd918ff3f6c6a4e5
-
SHA512
b8cdcca1c5f9ae7701eaef596ff629e9febd3e3929c05aba62602821f311fd4edce8924576ff07dc6ed7094a7992e60bc44bbf9f7b9289bed21c97a41587201d
-
SSDEEP
1536:0O3H4UYT7knSEUHAC4H3Pt9tyHpO3H4UYn:RX4Uo7kSEdzXPtPyHsX4Uo
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1860 hrl5217.tmp 4288 skwegk.exe -
Loads dropped DLL 1 IoCs
pid Process 4288 skwegk.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\skwegk.exe hrl5217.tmp File opened for modification C:\Windows\SysWOW64\skwegk.exe hrl5217.tmp File created C:\Windows\SysWOW64\hra33.dll skwegk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1860 set thread context of 1108 1860 hrl5217.tmp 85 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1540 wrote to memory of 4376 1540 rundll32.exe 82 PID 1540 wrote to memory of 4376 1540 rundll32.exe 82 PID 1540 wrote to memory of 4376 1540 rundll32.exe 82 PID 4376 wrote to memory of 1860 4376 rundll32.exe 83 PID 4376 wrote to memory of 1860 4376 rundll32.exe 83 PID 4376 wrote to memory of 1860 4376 rundll32.exe 83 PID 1860 wrote to memory of 1108 1860 hrl5217.tmp 85 PID 1860 wrote to memory of 1108 1860 hrl5217.tmp 85 PID 1860 wrote to memory of 1108 1860 hrl5217.tmp 85 PID 1860 wrote to memory of 1108 1860 hrl5217.tmp 85 PID 1860 wrote to memory of 1108 1860 hrl5217.tmp 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\hrl5217.tmpC:\Users\Admin\AppData\Local\Temp\hrl5217.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\calc.execalc.exe4⤵PID:1108
-
-
-
-
C:\Windows\SysWOW64\skwegk.exeC:\Windows\SysWOW64\skwegk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4288
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
85KB
MD58f114be9125798a2e24ab55fafb09590
SHA1aa070d571279542fe8c06a16f06afe6945d28d6e
SHA2569a542bd4f4349030fcb8c557ce997be76a8f12c2bcf38a03dd918ff3f6c6a4e5
SHA512b8cdcca1c5f9ae7701eaef596ff629e9febd3e3929c05aba62602821f311fd4edce8924576ff07dc6ed7094a7992e60bc44bbf9f7b9289bed21c97a41587201d
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e
-
Filesize
72KB
MD56af92a073c5c8097ac07673156ebff4d
SHA1d48b362ba12ad78446ee3380f792430d619617ee
SHA25695643d36b6cc8f3704e57b6795fbd9e31145c87080657ffc353b5ebb7d118947
SHA512df94ffa64f1cf97ef804fe1fed2fc37bc1fe5cc0663caa9b4dccd42abd399bd78afaa1c97b8992e433b796bfca8e2f3740b4724abf36534611aba5234b5a158e