Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
334s -
max time network
355s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe
Resource
win10v2004-20221111-en
General
-
Target
b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe
-
Size
1.0MB
-
MD5
c1531d22af6f9310a33649b65c59e268
-
SHA1
76e1a348db1020570d9bb2bc5b10c07a1b476080
-
SHA256
b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f
-
SHA512
ee382b37bfc27474e3bb8853fd8092b8171f50e5037e67ee10fb20df6b59b4ad3aa1167a77c6740123f3e2d3644a884837076f4c0e8627d0c898aa2302ec8e95
-
SSDEEP
12288:pb7RLI78pE/m4L9RnYJMP1cfQArt7k7TSEnozTYGbTB4NsM2PEaCxQoXjGblg+Ez:dk/mjuRu7yPo4iCz8Se6
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Louzz.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Louzz.exe:*:Enabled:Windows Messanger" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Louzz = "C:\\Users\\Admin\\AppData\\Roaming\\Louzz.exe" b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B0319D1-ABCF-203A-E6DA-ECDBCBAEB4C9} b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B0319D1-ABCF-203A-E6DA-ECDBCBAEB4C9}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Louzz.exe" b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{5B0319D1-ABCF-203A-E6DA-ECDBCBAEB4C9} b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{5B0319D1-ABCF-203A-E6DA-ECDBCBAEB4C9}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Louzz.exe" b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe -
resource yara_rule behavioral2/memory/1668-136-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1668-138-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1668-139-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1668-153-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Louzz = "C:\\Users\\Admin\\AppData\\Roaming\\Louzz.exe" b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Louzz = "C:\\Users\\Admin\\AppData\\Roaming\\Louzz.exe" b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3632 set thread context of 1668 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 81 PID 3632 set thread context of 0 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2400 reg.exe 3120 reg.exe 3008 reg.exe 1404 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeCreateTokenPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeAssignPrimaryTokenPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeLockMemoryPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeIncreaseQuotaPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeMachineAccountPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeTcbPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeSecurityPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeTakeOwnershipPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeLoadDriverPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeSystemProfilePrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeSystemtimePrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeProfSingleProcessPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeIncBasePriorityPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeCreatePagefilePrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeCreatePermanentPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeBackupPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeRestorePrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeShutdownPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeDebugPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeAuditPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeSystemEnvironmentPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeChangeNotifyPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeRemoteShutdownPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeUndockPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeSyncAgentPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeEnableDelegationPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeManageVolumePrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeImpersonatePrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeCreateGlobalPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: 31 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: 32 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: 33 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: 34 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: 35 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe Token: SeDebugPrivilege 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1668 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 81 PID 3632 wrote to memory of 1668 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 81 PID 3632 wrote to memory of 1668 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 81 PID 3632 wrote to memory of 1668 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 81 PID 3632 wrote to memory of 1668 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 81 PID 3632 wrote to memory of 1668 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 81 PID 3632 wrote to memory of 1668 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 81 PID 3632 wrote to memory of 1668 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 81 PID 3632 wrote to memory of 0 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe PID 3632 wrote to memory of 0 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe PID 3632 wrote to memory of 0 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe PID 3632 wrote to memory of 0 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe PID 3632 wrote to memory of 0 3632 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe PID 1668 wrote to memory of 1088 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 83 PID 1668 wrote to memory of 1088 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 83 PID 1668 wrote to memory of 1088 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 83 PID 1668 wrote to memory of 1288 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 85 PID 1668 wrote to memory of 1288 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 85 PID 1668 wrote to memory of 1288 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 85 PID 1668 wrote to memory of 3328 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 91 PID 1668 wrote to memory of 3328 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 91 PID 1668 wrote to memory of 3328 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 91 PID 1668 wrote to memory of 1364 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 90 PID 1668 wrote to memory of 1364 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 90 PID 1668 wrote to memory of 1364 1668 b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe 90 PID 1088 wrote to memory of 2400 1088 cmd.exe 92 PID 1088 wrote to memory of 2400 1088 cmd.exe 92 PID 1088 wrote to memory of 2400 1088 cmd.exe 92 PID 1288 wrote to memory of 3120 1288 cmd.exe 93 PID 1288 wrote to memory of 3120 1288 cmd.exe 93 PID 1288 wrote to memory of 3120 1288 cmd.exe 93 PID 3328 wrote to memory of 3008 3328 cmd.exe 94 PID 3328 wrote to memory of 3008 3328 cmd.exe 94 PID 3328 wrote to memory of 3008 3328 cmd.exe 94 PID 1364 wrote to memory of 1404 1364 cmd.exe 95 PID 1364 wrote to memory of 1404 1364 cmd.exe 95 PID 1364 wrote to memory of 1404 1364 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe"C:\Users\Admin\AppData\Local\Temp\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe"C:\Users\Admin\AppData\Local\Temp\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2400
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\b7a3050ee603440fdf8a865319342f65f6c93983e998ca700e6852d32f05270f.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:3120
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Louzz.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Louzz.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Louzz.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Louzz.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:3008
-
-
-