Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe
Resource
win10v2004-20220901-en
General
-
Target
388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe
-
Size
274KB
-
MD5
5b1b1c32c1f2a01b8eba0005d8f28c78
-
SHA1
2d1e522e37c1c951e73081834126bf432ca2f74c
-
SHA256
388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677
-
SHA512
57e9b4db7d0bb3ce0e16296f03d84a4aa22b3ef60d435c0930398c8e21e916d746a3971a698fdeed0b09c94767f33a968069f5c7432cbc300affbba03a6b203e
-
SSDEEP
6144:jr7fCNFvumQBgonmJaLo/+/+YXuYlswS9MvODqFXTzSNYVhW:jvfIIBgkS/+mE2vpqQNy
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\782300\\lsass.exe\"" lsass.exe -
Executes dropped EXE 2 IoCs
pid Process 1788 lsass.exe 2584 lsass.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Local Security Authority Process = "\"C:\\ProgramData\\782300\\lsass.exe\"" lsass.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe lsass.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe lsass.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2300 set thread context of 3872 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 90 PID 1788 set thread context of 2584 1788 lsass.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 3872 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 3872 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe 2584 lsass.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3872 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe Token: SeDebugPrivilege 1788 lsass.exe Token: SeDebugPrivilege 2584 lsass.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2584 lsass.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3872 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 90 PID 2300 wrote to memory of 3872 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 90 PID 2300 wrote to memory of 3872 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 90 PID 2300 wrote to memory of 3872 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 90 PID 2300 wrote to memory of 3872 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 90 PID 2300 wrote to memory of 3872 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 90 PID 2300 wrote to memory of 3872 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 90 PID 2300 wrote to memory of 3872 2300 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 90 PID 3872 wrote to memory of 1788 3872 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 91 PID 3872 wrote to memory of 1788 3872 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 91 PID 3872 wrote to memory of 1788 3872 388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe 91 PID 1788 wrote to memory of 2584 1788 lsass.exe 93 PID 1788 wrote to memory of 2584 1788 lsass.exe 93 PID 1788 wrote to memory of 2584 1788 lsass.exe 93 PID 1788 wrote to memory of 2584 1788 lsass.exe 93 PID 1788 wrote to memory of 2584 1788 lsass.exe 93 PID 1788 wrote to memory of 2584 1788 lsass.exe 93 PID 1788 wrote to memory of 2584 1788 lsass.exe 93 PID 1788 wrote to memory of 2584 1788 lsass.exe 93 PID 2584 wrote to memory of 2300 2584 lsass.exe 82 PID 2584 wrote to memory of 2300 2584 lsass.exe 82 PID 2584 wrote to memory of 2300 2584 lsass.exe 82 PID 2584 wrote to memory of 2300 2584 lsass.exe 82 PID 2584 wrote to memory of 2300 2584 lsass.exe 82 PID 2584 wrote to memory of 3872 2584 lsass.exe 90 PID 2584 wrote to memory of 3872 2584 lsass.exe 90 PID 2584 wrote to memory of 3872 2584 lsass.exe 90 PID 2584 wrote to memory of 3872 2584 lsass.exe 90 PID 2584 wrote to memory of 3872 2584 lsass.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe"C:\Users\Admin\AppData\Local\Temp\388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe"C:\Users\Admin\AppData\Local\Temp\388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\ProgramData\782300\lsass.exe"C:\ProgramData\782300\lsass.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\ProgramData\782300\lsass.exe"C:\ProgramData\782300\lsass.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD55b1b1c32c1f2a01b8eba0005d8f28c78
SHA12d1e522e37c1c951e73081834126bf432ca2f74c
SHA256388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677
SHA51257e9b4db7d0bb3ce0e16296f03d84a4aa22b3ef60d435c0930398c8e21e916d746a3971a698fdeed0b09c94767f33a968069f5c7432cbc300affbba03a6b203e
-
Filesize
274KB
MD55b1b1c32c1f2a01b8eba0005d8f28c78
SHA12d1e522e37c1c951e73081834126bf432ca2f74c
SHA256388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677
SHA51257e9b4db7d0bb3ce0e16296f03d84a4aa22b3ef60d435c0930398c8e21e916d746a3971a698fdeed0b09c94767f33a968069f5c7432cbc300affbba03a6b203e
-
Filesize
274KB
MD55b1b1c32c1f2a01b8eba0005d8f28c78
SHA12d1e522e37c1c951e73081834126bf432ca2f74c
SHA256388ff1a07a3e57fb51f2a7e4668e93087e256d7d456c485bf0483a30566f8677
SHA51257e9b4db7d0bb3ce0e16296f03d84a4aa22b3ef60d435c0930398c8e21e916d746a3971a698fdeed0b09c94767f33a968069f5c7432cbc300affbba03a6b203e