Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-es -
resource tags
arch:x64arch:x86image:win7-20221111-eslocale:es-esos:windows7-x64systemwindows -
submitted
07/02/2023, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
lghub_installer.exe
Resource
win7-20221111-es
Behavioral task
behavioral2
Sample
lghub_installer.exe
Resource
win10v2004-20221111-es
General
-
Target
lghub_installer.exe
-
Size
39.6MB
-
MD5
e11bc00bbe8a70a3cb7786d16434d9ca
-
SHA1
89bf143bfe0af7cb1372b8e5e24524d2df8ed13f
-
SHA256
234be8544a1cacdaadccd0718d14be477c861e38a1a8cf06ea5669ea5a472fb7
-
SHA512
b73e33bdfc9d4c8c35ca1ee0947fdebb707c98c79fd731e23529a601aeeffa61e972b5a0bc12d3c8efcbc64b59382238dd8c62ca12cef07716f85c924dc951d5
-
SSDEEP
786432:U05sfbEpttD7yBG/4M3OW+upttD7yBG/PcXU9g5D:U0cEpttD7y0/pnpttD7y0/0XUm5D
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 796 vc_redist.x64.exe 1268 vc_redist.x64.exe 1740 vc_redist.x86.exe 268 vc_redist.x86.exe -
Loads dropped DLL 6 IoCs
pid Process 796 vc_redist.x64.exe 1268 vc_redist.x64.exe 1740 vc_redist.x86.exe 268 vc_redist.x86.exe 1028 lghub_installer.exe 1028 lghub_installer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1028 lghub_installer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1028 wrote to memory of 796 1028 lghub_installer.exe 28 PID 1028 wrote to memory of 796 1028 lghub_installer.exe 28 PID 1028 wrote to memory of 796 1028 lghub_installer.exe 28 PID 1028 wrote to memory of 796 1028 lghub_installer.exe 28 PID 1028 wrote to memory of 796 1028 lghub_installer.exe 28 PID 1028 wrote to memory of 796 1028 lghub_installer.exe 28 PID 1028 wrote to memory of 796 1028 lghub_installer.exe 28 PID 796 wrote to memory of 1268 796 vc_redist.x64.exe 29 PID 796 wrote to memory of 1268 796 vc_redist.x64.exe 29 PID 796 wrote to memory of 1268 796 vc_redist.x64.exe 29 PID 796 wrote to memory of 1268 796 vc_redist.x64.exe 29 PID 796 wrote to memory of 1268 796 vc_redist.x64.exe 29 PID 796 wrote to memory of 1268 796 vc_redist.x64.exe 29 PID 796 wrote to memory of 1268 796 vc_redist.x64.exe 29 PID 1028 wrote to memory of 1740 1028 lghub_installer.exe 30 PID 1028 wrote to memory of 1740 1028 lghub_installer.exe 30 PID 1028 wrote to memory of 1740 1028 lghub_installer.exe 30 PID 1028 wrote to memory of 1740 1028 lghub_installer.exe 30 PID 1028 wrote to memory of 1740 1028 lghub_installer.exe 30 PID 1028 wrote to memory of 1740 1028 lghub_installer.exe 30 PID 1028 wrote to memory of 1740 1028 lghub_installer.exe 30 PID 1740 wrote to memory of 268 1740 vc_redist.x86.exe 31 PID 1740 wrote to memory of 268 1740 vc_redist.x86.exe 31 PID 1740 wrote to memory of 268 1740 vc_redist.x86.exe 31 PID 1740 wrote to memory of 268 1740 vc_redist.x86.exe 31 PID 1740 wrote to memory of 268 1740 vc_redist.x86.exe 31 PID 1740 wrote to memory of 268 1740 vc_redist.x86.exe 31 PID 1740 wrote to memory of 268 1740 vc_redist.x86.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\lghub_installer.exe"C:\Users\Admin\AppData\Local\Temp\lghub_installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" /install /quiet /norestart2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\Temp\{CF054438-7136-429C-981A-AF29939D326A}\.cr\vc_redist.x64.exe"C:\Windows\Temp\{CF054438-7136-429C-981A-AF29939D326A}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188 /install /quiet /norestart3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1268
-
-
-
C:\Users\Admin\AppData\Local\Temp\vc_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\vc_redist.x86.exe" /install /quiet /norestart2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Temp\{0433D6DA-78A2-4E6A-96A7-1EB447293A75}\.cr\vc_redist.x86.exe"C:\Windows\Temp\{0433D6DA-78A2-4E6A-96A7-1EB447293A75}\.cr\vc_redist.x86.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vc_redist.x86.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188 /install /quiet /norestart3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.4MB
MD5be433764fa9bbe0f2f9c654f6512c9e0
SHA1b87c38d093872d7be7e191f01107b39c87888a5a
SHA25640ea2955391c9eae3e35619c4c24b5aaf3d17aeaa6d09424ee9672aa9372aeed
SHA5128a050ebd392654ce5981af3d0bf99107bfa576529bce8325a7ccc46f92917515744026a2d0ea49afb72bbc4e4278638a0677c6596ad96b7019e47c250e438191
-
Filesize
14.4MB
MD5be433764fa9bbe0f2f9c654f6512c9e0
SHA1b87c38d093872d7be7e191f01107b39c87888a5a
SHA25640ea2955391c9eae3e35619c4c24b5aaf3d17aeaa6d09424ee9672aa9372aeed
SHA5128a050ebd392654ce5981af3d0bf99107bfa576529bce8325a7ccc46f92917515744026a2d0ea49afb72bbc4e4278638a0677c6596ad96b7019e47c250e438191
-
Filesize
13.7MB
MD524e8177b25c072f4fb0d37496ccdbb34
SHA1afa5badce64ee67290add24e0dc3d8210954ac6c
SHA256e59ae3e886bd4571a811fe31a47959ae5c40d87c583f786816c60440252cd7ec
SHA5122fda8abc77b6ed9e98a2b120628e4e3b9458f2b18998c836eec1de82642244fe55234c7e52d6036d8b75c4b707a24f12fa639cc92d4234e94ed604a259d651e4
-
Filesize
13.7MB
MD524e8177b25c072f4fb0d37496ccdbb34
SHA1afa5badce64ee67290add24e0dc3d8210954ac6c
SHA256e59ae3e886bd4571a811fe31a47959ae5c40d87c583f786816c60440252cd7ec
SHA5122fda8abc77b6ed9e98a2b120628e4e3b9458f2b18998c836eec1de82642244fe55234c7e52d6036d8b75c4b707a24f12fa639cc92d4234e94ed604a259d651e4
-
Filesize
632KB
MD5c9d95472a5627c6c455e74c8b8fef5be
SHA134cb7f8f8b8dede7be6fd99e2b4bddaa37e5db82
SHA2564b1bf90a0e4e3a628613c2fe42ddba589ee6303e37ccc70cf99ddc92dde03b0b
SHA512989caff542f310972c15364925af542984ca73c1c1eec82fcbd1ea4bf9186487fd8349989afc95db4e761ebcbb8b14ce49482bc61d51b3259d134c571f4fab31
-
Filesize
632KB
MD5c9d95472a5627c6c455e74c8b8fef5be
SHA134cb7f8f8b8dede7be6fd99e2b4bddaa37e5db82
SHA2564b1bf90a0e4e3a628613c2fe42ddba589ee6303e37ccc70cf99ddc92dde03b0b
SHA512989caff542f310972c15364925af542984ca73c1c1eec82fcbd1ea4bf9186487fd8349989afc95db4e761ebcbb8b14ce49482bc61d51b3259d134c571f4fab31
-
Filesize
632KB
MD594970fc3a8ed7b9de44f4117419ce829
SHA1aa1292f049c4173e2ab60b59b62f267fd884d21a
SHA256de1acbb1df68a39a5b966303ac1b609dde2688b28ebf3eba8d2adeeb3d90bf5e
SHA512b17bd215b83bfa46512b73c3d9f430806ca3bea13bebde971e8edd972614e54a7ba3d6fc3439078cdfdaa7eeb1f3f9054bf03ed5c45b622b691b968d4ec0566f
-
Filesize
632KB
MD594970fc3a8ed7b9de44f4117419ce829
SHA1aa1292f049c4173e2ab60b59b62f267fd884d21a
SHA256de1acbb1df68a39a5b966303ac1b609dde2688b28ebf3eba8d2adeeb3d90bf5e
SHA512b17bd215b83bfa46512b73c3d9f430806ca3bea13bebde971e8edd972614e54a7ba3d6fc3439078cdfdaa7eeb1f3f9054bf03ed5c45b622b691b968d4ec0566f
-
Filesize
624KB
MD5ae74a99fb9f5d5e19307134301ccf089
SHA15e06c7be14ead1e818b7c4b8d5ba74ab47ffba4b
SHA256872ca67c70c4150fe57de2aaed17d77e5e993501074739694182c62f335c45e1
SHA512d8fbf7ca389d8c28e00e0fd65a06057a15790d03e679f1e12eba41a9a681c6467dbc534470691f303ec07b242723404d0f492b5e6fc9b7d59218fc295dbdbca3
-
Filesize
5.4MB
MD5e7d7ad719aeafc88d6f77210e1baba5f
SHA1008aab25b118529dea18f420d47c1de4edd87f83
SHA256c000e45fa080aa45e39beaf1b67bae677eb3823d8f410f0995e7080e054ef582
SHA512c750271b298b2a43503671c1c369bebb4e9e05ac4954123d545d59163af71ffddcfc925462649455afcd134558a8830874c0802d7def659ebad731b32984597d
-
Filesize
632KB
MD5c9d95472a5627c6c455e74c8b8fef5be
SHA134cb7f8f8b8dede7be6fd99e2b4bddaa37e5db82
SHA2564b1bf90a0e4e3a628613c2fe42ddba589ee6303e37ccc70cf99ddc92dde03b0b
SHA512989caff542f310972c15364925af542984ca73c1c1eec82fcbd1ea4bf9186487fd8349989afc95db4e761ebcbb8b14ce49482bc61d51b3259d134c571f4fab31
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
Filesize
632KB
MD594970fc3a8ed7b9de44f4117419ce829
SHA1aa1292f049c4173e2ab60b59b62f267fd884d21a
SHA256de1acbb1df68a39a5b966303ac1b609dde2688b28ebf3eba8d2adeeb3d90bf5e
SHA512b17bd215b83bfa46512b73c3d9f430806ca3bea13bebde971e8edd972614e54a7ba3d6fc3439078cdfdaa7eeb1f3f9054bf03ed5c45b622b691b968d4ec0566f