Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    261s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    20/12/2022, 04:22

General

  • Target

    LDsetup.exe

  • Size

    3.8MB

  • MD5

    b7e4986aef0fc05ef8469deef7b26f5c

  • SHA1

    a0865174ce46291352219601ea64f1e66e258a72

  • SHA256

    af7b627d3caa69c65fc216080fca958656a71cf82706d70e7d46a813cd65d2d4

  • SHA512

    e1d04a29859143c993e12d4ad7704d9684da0225c622e2af08b7b168f7ac197e1ad74fd84a6cfaa5db5899ad58a4d9e3fe083ded6b7255153f07dae662224c91

  • SSDEEP

    98304:7kLY9HJk9WcIE6mMuT205ggn7TsTkvrsuxH73b55ljQ:w0pOzkuT20557Q4vrsCb3dnk

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDsetup.exe
    "C:\Users\Admin\AppData\Local\Temp\LDsetup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\is-2KR01.tmp\LDsetup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2KR01.tmp\LDsetup.tmp" /SL5="$70126,3153348,832512,C:\Users\Admin\AppData\Local\Temp\LDsetup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\COMDLG32.OCX"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:268
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\COMCTL32.OCX"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:1924
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\COMCT232.OCX"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:1048
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\MSCOMCTL.OCX"
        3⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1680
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Program Files (x86)\Lucky Days 2.3\ReadMe.pdf"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1812
      • C:\Program Files (x86)\Lucky Days 2.3\LuckyDays.exe
        "C:\Program Files (x86)\Lucky Days 2.3\LuckyDays.exe"
        3⤵
        • Executes dropped EXE
        PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Lucky Days 2.3\LuckyDays.exe

    Filesize

    2.9MB

    MD5

    0be8ac9aab867605cba3c1f736169330

    SHA1

    a6611d8a1a97460c2690b06790b07ddbec67c045

    SHA256

    19c74e70f276e41d19a3e87cf4ea7048267023ed7b5aab5be99f10fe69ae5076

    SHA512

    3cfa558ba10d9987451cf076ab9db49e5c7249789bb07c11d89f19312ea8da749d8efffad5a635e1877eb55d2bf05c3b038489b8774ba6fd97afc26661bb884f

  • C:\Program Files (x86)\Lucky Days 2.3\LuckyDays.exe

    Filesize

    2.9MB

    MD5

    0be8ac9aab867605cba3c1f736169330

    SHA1

    a6611d8a1a97460c2690b06790b07ddbec67c045

    SHA256

    19c74e70f276e41d19a3e87cf4ea7048267023ed7b5aab5be99f10fe69ae5076

    SHA512

    3cfa558ba10d9987451cf076ab9db49e5c7249789bb07c11d89f19312ea8da749d8efffad5a635e1877eb55d2bf05c3b038489b8774ba6fd97afc26661bb884f

  • C:\Program Files (x86)\Lucky Days 2.3\ReadMe.pdf

    Filesize

    20KB

    MD5

    b13abb8e6f5c7dce3d20fec88c6ed4fa

    SHA1

    12794767da664e033276c8de4fe6be2294098cea

    SHA256

    c274b2c8a0a360d55bb71678ba1880811259479c7247cfa6a0b4683f98f95036

    SHA512

    2a6c95ef998220088c7dd9bfd33dadbf25c6696c10fa12576fb1cded26fa6b963bab0bee6c5062bd74dbcefd2432b72dbeba902b08b74e3cfb5f03a4deca702f

  • C:\Program Files (x86)\Lucky Days 2.3\ephemeris\2000.N

    Filesize

    29KB

    MD5

    0958f2eca84e1d4d0ec53df7b1eefb4d

    SHA1

    7cc095141eb9c47befd313a2462bce24d72f17e4

    SHA256

    edfac8e75fe9504ce8138d25b56b683f5de1776ea293c174274454c1b3a05909

    SHA512

    781a9a309107585e6c57b330b0db203bc71e22083de369f6564a9c9439197f90f6b1fdb9eb1b1a621a0b346aeaee61871e95cf68883256719b43c9667099d165

  • C:\Program Files (x86)\Lucky Days 2.3\ephemeris\2021.N

    Filesize

    29KB

    MD5

    9499114072f79c984652d4def57ec537

    SHA1

    df6eb664ab80235278280da4fbc965f3b5581624

    SHA256

    351ed30c388e4c489f30b6f29c5c855f67be1df4b584b723860e779f0cce7cba

    SHA512

    a16265c925650b14494946634844277542257da1f6049d84c8d5a5f0b474de53442c75c22dd9740b40e374c0809e9d4ecac72d38b5dff5f8328abc93d2cb6ff0

  • C:\Program Files (x86)\Lucky Days 2.3\ephemeris\2022.N

    Filesize

    29KB

    MD5

    f58e1e683c70a735711232dcc73c48c9

    SHA1

    2544acfe5a8ef9da283c5a0e72418007cd3b7445

    SHA256

    0761f0459c8f2832b3f1f3cc69f7d83b33796fbdb4e868e3ba55abf27e27ea26

    SHA512

    2a7efb8e0b2179c98ac8c157de69288ca3904acbb4643369e838611c0da48d0be3c40ed95a8e7e6425d671a728dee3707d252c06fba96be3bad99140bc2b6ac3

  • C:\Users\Admin\AppData\Local\Temp\is-2KR01.tmp\LDsetup.tmp

    Filesize

    3.0MB

    MD5

    8abcb6c8f865d6515e9aa1e271ad1bb6

    SHA1

    5c6d17eea410641cf7233d9d55884fbb89e05b55

    SHA256

    5c495afb3b1b9cd0a62ef3d41320384f3abdd9bdaec9f6789045f016fb86ed20

    SHA512

    711ac1dd94ed05ba572a5250b470775991e61daa5181ea8d26649a5d539d5019dd711f8d2e262f7d1b98fc05ab37a75dfac982ea7753909e9fe656bb2d36f92a

  • C:\Users\Admin\AppData\Local\Temp\is-2KR01.tmp\LDsetup.tmp

    Filesize

    3.0MB

    MD5

    8abcb6c8f865d6515e9aa1e271ad1bb6

    SHA1

    5c6d17eea410641cf7233d9d55884fbb89e05b55

    SHA256

    5c495afb3b1b9cd0a62ef3d41320384f3abdd9bdaec9f6789045f016fb86ed20

    SHA512

    711ac1dd94ed05ba572a5250b470775991e61daa5181ea8d26649a5d539d5019dd711f8d2e262f7d1b98fc05ab37a75dfac982ea7753909e9fe656bb2d36f92a

  • C:\Windows\SysWOW64\COMCT232.OCX

    Filesize

    160KB

    MD5

    1b63af252cfeff520871f0ae37c80c5e

    SHA1

    d52d32b1e1c0136803846049f5919484a64d0a85

    SHA256

    45af0570ac918a57a0e4f868cc4198cbac02957c6be35ec131987101683a9f97

    SHA512

    34b0e3b0f7f160cff89c369218af9e761050ee235b926fb2204b29776c748bb5198c0ca82cdf19c4d96aad0fc3591d921e38b9223c83dd8585c5656441b2353e

  • C:\Windows\SysWOW64\COMCTL32.OCX

    Filesize

    594KB

    MD5

    eb5f811c1f78005b3c147599a0cccf51

    SHA1

    19e8153569d1379634ba9d12e84dc35b10faf689

    SHA256

    bf4147f8a12bec3d54e3ef941475e29d852a1876117c6ce88f47b882ef6d4a03

    SHA512

    2eeed9e02c2fbff39c021340a8fa10417a47e243ae2d6d5a54e3e69114dccb402f2d836500c6d771ff971cf0070def3004f3e828a9e7686ef0e1457e1583ecec

  • C:\Windows\SysWOW64\COMDLG32.OCX

    Filesize

    137KB

    MD5

    b73809a916e6d7c1ae56f182a2e8f7e2

    SHA1

    34e4213d8bf0e150d3f50ae0bd3f5b328e1105f5

    SHA256

    64c6ee999562961d11af130254ad3ffd24bb725d3c18e7877f9fd362f4936195

    SHA512

    26c28cb6c7e1b47425403ab8850a765ac420dd6474327ce8469376219c830ab46218383d15a73c9ea3a23fc6b5f392ee6e2a1632a1bf644b1bd1a05a4729e333

  • \Program Files (x86)\Lucky Days 2.3\LuckyDays.exe

    Filesize

    2.9MB

    MD5

    0be8ac9aab867605cba3c1f736169330

    SHA1

    a6611d8a1a97460c2690b06790b07ddbec67c045

    SHA256

    19c74e70f276e41d19a3e87cf4ea7048267023ed7b5aab5be99f10fe69ae5076

    SHA512

    3cfa558ba10d9987451cf076ab9db49e5c7249789bb07c11d89f19312ea8da749d8efffad5a635e1877eb55d2bf05c3b038489b8774ba6fd97afc26661bb884f

  • \Program Files (x86)\Lucky Days 2.3\LuckyDays.exe

    Filesize

    2.9MB

    MD5

    0be8ac9aab867605cba3c1f736169330

    SHA1

    a6611d8a1a97460c2690b06790b07ddbec67c045

    SHA256

    19c74e70f276e41d19a3e87cf4ea7048267023ed7b5aab5be99f10fe69ae5076

    SHA512

    3cfa558ba10d9987451cf076ab9db49e5c7249789bb07c11d89f19312ea8da749d8efffad5a635e1877eb55d2bf05c3b038489b8774ba6fd97afc26661bb884f

  • \Users\Admin\AppData\Local\Temp\is-2KR01.tmp\LDsetup.tmp

    Filesize

    3.0MB

    MD5

    8abcb6c8f865d6515e9aa1e271ad1bb6

    SHA1

    5c6d17eea410641cf7233d9d55884fbb89e05b55

    SHA256

    5c495afb3b1b9cd0a62ef3d41320384f3abdd9bdaec9f6789045f016fb86ed20

    SHA512

    711ac1dd94ed05ba572a5250b470775991e61daa5181ea8d26649a5d539d5019dd711f8d2e262f7d1b98fc05ab37a75dfac982ea7753909e9fe656bb2d36f92a

  • \Windows\SysWOW64\COMCT232.OCX

    Filesize

    160KB

    MD5

    1b63af252cfeff520871f0ae37c80c5e

    SHA1

    d52d32b1e1c0136803846049f5919484a64d0a85

    SHA256

    45af0570ac918a57a0e4f868cc4198cbac02957c6be35ec131987101683a9f97

    SHA512

    34b0e3b0f7f160cff89c369218af9e761050ee235b926fb2204b29776c748bb5198c0ca82cdf19c4d96aad0fc3591d921e38b9223c83dd8585c5656441b2353e

  • \Windows\SysWOW64\COMCTL32.OCX

    Filesize

    594KB

    MD5

    eb5f811c1f78005b3c147599a0cccf51

    SHA1

    19e8153569d1379634ba9d12e84dc35b10faf689

    SHA256

    bf4147f8a12bec3d54e3ef941475e29d852a1876117c6ce88f47b882ef6d4a03

    SHA512

    2eeed9e02c2fbff39c021340a8fa10417a47e243ae2d6d5a54e3e69114dccb402f2d836500c6d771ff971cf0070def3004f3e828a9e7686ef0e1457e1583ecec

  • \Windows\SysWOW64\COMDLG32.OCX

    Filesize

    137KB

    MD5

    b73809a916e6d7c1ae56f182a2e8f7e2

    SHA1

    34e4213d8bf0e150d3f50ae0bd3f5b328e1105f5

    SHA256

    64c6ee999562961d11af130254ad3ffd24bb725d3c18e7877f9fd362f4936195

    SHA512

    26c28cb6c7e1b47425403ab8850a765ac420dd6474327ce8469376219c830ab46218383d15a73c9ea3a23fc6b5f392ee6e2a1632a1bf644b1bd1a05a4729e333

  • memory/1188-62-0x0000000074401000-0x0000000074403000-memory.dmp

    Filesize

    8KB

  • memory/1748-87-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1748-54-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

    Filesize

    8KB

  • memory/1748-61-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1748-55-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2016-85-0x000007FEF3B40000-0x000007FEF4563000-memory.dmp

    Filesize

    10.1MB

  • memory/2016-86-0x000007FEF24C0000-0x000007FEF3556000-memory.dmp

    Filesize

    16.6MB

  • memory/2016-89-0x0000000000B36000-0x0000000000B55000-memory.dmp

    Filesize

    124KB

  • memory/2016-90-0x0000000000B36000-0x0000000000B55000-memory.dmp

    Filesize

    124KB