Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1add_attack.zip
windows7-x64
9add_attack.zip
windows10-2004-x64
10add_attack/Slava.exe
windows7-x64
7add_attack/Slava.exe
windows10-2004-x64
7add_attack...AC.exe
windows7-x64
7add_attack...AC.exe
windows10-2004-x64
7add_attack/goland.exe
windows7-x64
9add_attack/goland.exe
windows10-2004-x64
9add_attack/neee.exe
windows7-x64
10add_attack/neee.exe
windows10-2004-x64
10Analysis
-
max time kernel
749s -
max time network
779s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
19/03/2023, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
add_attack.zip
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
add_attack.zip
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
add_attack/Slava.exe
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
add_attack/Slava.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral5
Sample
add_attack/cockkieeAC.exe
Resource
win7-20230220-es
Behavioral task
behavioral6
Sample
add_attack/cockkieeAC.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral7
Sample
add_attack/goland.exe
Resource
win7-20230220-es
Behavioral task
behavioral8
Sample
add_attack/goland.exe
Resource
win10v2004-20230220-es
Behavioral task
behavioral9
Sample
add_attack/neee.exe
Resource
win7-20230220-es
Behavioral task
behavioral10
Sample
add_attack/neee.exe
Resource
win10v2004-20230220-es
General
-
Target
add_attack.zip
-
Size
20.4MB
-
MD5
580e4b67d15856343fdf60ad011da65c
-
SHA1
c40ffb955bee114d87bfc7306a0271e31c9e7347
-
SHA256
1055458a8ee3ee7724fd82ca27387523cb1d0d1733ac8cceaf99fab47e35d105
-
SHA512
2d5adc8d3146a6de809c79c9de59db4cf12209cda1bdc059339d330a47da4e0347fc0205df4c81456909e34464959c6a2c4362b8bfdcaa8b9288e5505d156ef6
-
SSDEEP
393216:e+j0yu69ioV7WtMGJFVJzYooRWgaMoU/Y/X1X+CQ821nFEpqpSQVL:LoErGJhUPWeoX1g821F3N
Malware Config
Extracted
laplas
http://185.106.92.104
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ goland.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ goland.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion goland.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion goland.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion goland.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion goland.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation neee.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation neee.exe -
Executes dropped EXE 9 IoCs
pid Process 3872 goland.exe 1780 neee.exe 4612 Slava.exe 4032 cockkieeAC.exe 3864 svcservice.exe 4584 ntlhost.exe 1484 goland.exe 1900 neee.exe 4460 svcservice.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" neee.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" goland.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" neee.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA goland.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA goland.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 3872 goland.exe 1780 neee.exe 1780 neee.exe 3864 svcservice.exe 3864 svcservice.exe 4584 ntlhost.exe 1484 goland.exe 1900 neee.exe 1900 neee.exe 4460 svcservice.exe 4460 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 70 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1780 neee.exe 1780 neee.exe 3864 svcservice.exe 3864 svcservice.exe 1900 neee.exe 1900 neee.exe 4460 svcservice.exe 4460 svcservice.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3428 7zG.exe Token: 35 3428 7zG.exe Token: SeSecurityPrivilege 3428 7zG.exe Token: SeSecurityPrivilege 3428 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3428 7zG.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2136 4612 Slava.exe 109 PID 4612 wrote to memory of 2136 4612 Slava.exe 109 PID 4032 wrote to memory of 2680 4032 cockkieeAC.exe 107 PID 4032 wrote to memory of 2680 4032 cockkieeAC.exe 107 PID 2680 wrote to memory of 2560 2680 cmd.exe 111 PID 2680 wrote to memory of 2560 2680 cmd.exe 111 PID 2136 wrote to memory of 2852 2136 cmd.exe 110 PID 2136 wrote to memory of 2852 2136 cmd.exe 110 PID 1780 wrote to memory of 3864 1780 neee.exe 113 PID 1780 wrote to memory of 3864 1780 neee.exe 113 PID 1780 wrote to memory of 3864 1780 neee.exe 113 PID 3872 wrote to memory of 4584 3872 goland.exe 114 PID 3872 wrote to memory of 4584 3872 goland.exe 114 PID 1900 wrote to memory of 4460 1900 neee.exe 117 PID 1900 wrote to memory of 4460 1900 neee.exe 117 PID 1900 wrote to memory of 4460 1900 neee.exe 117
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\add_attack.zip1⤵PID:5024
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3748
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\add_attack\" -spe -an -ai#7zMap8062:78:7zEvent20961⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3428
-
C:\Users\Admin\Desktop\add_attack\goland.exe"C:\Users\Admin\Desktop\add_attack\goland.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4584
-
-
C:\Users\Admin\Desktop\add_attack\neee.exe"C:\Users\Admin\Desktop\add_attack\neee.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3864
-
-
C:\Users\Admin\Desktop\add_attack\Slava.exe"C:\Users\Admin\Desktop\add_attack\Slava.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\Desktop\add_attack\Slava.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:2852
-
-
-
C:\Users\Admin\Desktop\add_attack\cockkieeAC.exe"C:\Users\Admin\Desktop\add_attack\cockkieeAC.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\Desktop\add_attack\cockkieeAC.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:2560
-
-
-
C:\Users\Admin\Desktop\add_attack\goland.exe"C:\Users\Admin\Desktop\add_attack\goland.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1484
-
C:\Users\Admin\Desktop\add_attack\neee.exe"C:\Users\Admin\Desktop\add_attack\neee.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5444bcb3a3fcf8389296c49467f27e1d6
SHA17a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
SHA2562689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
SHA5129fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
-
Filesize
633B
MD5c5298d2c78be8fdfc264eb6fe3e275f8
SHA1f09de5f443da081efaff0155f422ca0375edd164
SHA256de32b3c0549fde0dc5ac435a89f16a87832a0632b6602e75f552d07074081577
SHA5125aeb5013b00e13cd8a172639bc7c675bd06cc0473ae9844c9c324e5c322987ddeff986bd4a8e620ce0ca9d1098a3ee8bbb4802789d1e89b0ec0cecf2f55a4853
-
Filesize
781.6MB
MD59f11482b0f8072a87f4d9edd3ba8fcc2
SHA16c377d6a96980ad2bf3e21667c282be7adb5ebef
SHA25658d15bd143d431fdfb3e805398c700e81a3f5d48ce100f07041fea1af12b97b3
SHA512a4e5ced1cf488485bc462764b250b2d0420f1016ec25eec75f64f96d9f55d3c4aa9fc1ba4db6925319043e17ad939b82b2f52e3a6494f969574ef2b1a4a16015
-
Filesize
781.6MB
MD59f11482b0f8072a87f4d9edd3ba8fcc2
SHA16c377d6a96980ad2bf3e21667c282be7adb5ebef
SHA25658d15bd143d431fdfb3e805398c700e81a3f5d48ce100f07041fea1af12b97b3
SHA512a4e5ced1cf488485bc462764b250b2d0420f1016ec25eec75f64f96d9f55d3c4aa9fc1ba4db6925319043e17ad939b82b2f52e3a6494f969574ef2b1a4a16015
-
Filesize
787.3MB
MD5a4009d992b3a99c9a8f35cad179c98ed
SHA141895ecc227dc6ed0340c3c84216c09ce9a8961e
SHA256a131120dbb6c9bee78167ab64ad7fb79b37436d84a40808edc21895464bbf5a5
SHA51218e654bb2e9cc1707200f8ed533a72827d9a4e093bb710f89ce337fe532fc94b78cfdd149025726e0a9179955756a52a270ace48692ab13e4b68434654933e31
-
Filesize
787.3MB
MD5a4009d992b3a99c9a8f35cad179c98ed
SHA141895ecc227dc6ed0340c3c84216c09ce9a8961e
SHA256a131120dbb6c9bee78167ab64ad7fb79b37436d84a40808edc21895464bbf5a5
SHA51218e654bb2e9cc1707200f8ed533a72827d9a4e093bb710f89ce337fe532fc94b78cfdd149025726e0a9179955756a52a270ace48692ab13e4b68434654933e31
-
Filesize
787.3MB
MD5a4009d992b3a99c9a8f35cad179c98ed
SHA141895ecc227dc6ed0340c3c84216c09ce9a8961e
SHA256a131120dbb6c9bee78167ab64ad7fb79b37436d84a40808edc21895464bbf5a5
SHA51218e654bb2e9cc1707200f8ed533a72827d9a4e093bb710f89ce337fe532fc94b78cfdd149025726e0a9179955756a52a270ace48692ab13e4b68434654933e31
-
Filesize
787.3MB
MD5a4009d992b3a99c9a8f35cad179c98ed
SHA141895ecc227dc6ed0340c3c84216c09ce9a8961e
SHA256a131120dbb6c9bee78167ab64ad7fb79b37436d84a40808edc21895464bbf5a5
SHA51218e654bb2e9cc1707200f8ed533a72827d9a4e093bb710f89ce337fe532fc94b78cfdd149025726e0a9179955756a52a270ace48692ab13e4b68434654933e31
-
Filesize
13.9MB
MD51fa21564b4463aa7a564a20fa00dafba
SHA144d44ad94ede70ae8bdf75ea18660911f5a22915
SHA256f9c21532868a2cd3cbeaa22f92c237cb73bff27d73fc49716d81c89eedb72be9
SHA5122467c316ca826f757c0eae92a295ac9e3d4cde38936f480fdbaea1fbaa933c298c4d3ac7ca361f20c246c768591f02b8a6c18c4064780803585d1b7cbf914abf
-
Filesize
13.9MB
MD51fa21564b4463aa7a564a20fa00dafba
SHA144d44ad94ede70ae8bdf75ea18660911f5a22915
SHA256f9c21532868a2cd3cbeaa22f92c237cb73bff27d73fc49716d81c89eedb72be9
SHA5122467c316ca826f757c0eae92a295ac9e3d4cde38936f480fdbaea1fbaa933c298c4d3ac7ca361f20c246c768591f02b8a6c18c4064780803585d1b7cbf914abf
-
Filesize
13.9MB
MD550f31873c5df2e169f1ec5ebab8ba2c3
SHA143dfd3859c1763ced1eee0d0ea934a76aaa0fd4e
SHA256adcf0ee814651b8a561d827d7ecc7a9aee660a950511c1ffae7d16f426f8de14
SHA512f5e408bcab7318edc079d553000f1110c0376ed1a0e11360280c99ec416a588d19ab5a0ed2ae33abc9746f7974d2f6c6c2ed53bca8fc51c890b813b9db9251ca
-
Filesize
13.9MB
MD550f31873c5df2e169f1ec5ebab8ba2c3
SHA143dfd3859c1763ced1eee0d0ea934a76aaa0fd4e
SHA256adcf0ee814651b8a561d827d7ecc7a9aee660a950511c1ffae7d16f426f8de14
SHA512f5e408bcab7318edc079d553000f1110c0376ed1a0e11360280c99ec416a588d19ab5a0ed2ae33abc9746f7974d2f6c6c2ed53bca8fc51c890b813b9db9251ca
-
Filesize
2.6MB
MD5fc6d40512829e36687854cb0118a5a1e
SHA1cf801f9dad93b5ebbcef79b093b034b45aa75a1e
SHA25658c0d2f945207a56f5baefbb320d7ddbd01089205025de05133db173281e65e2
SHA5128545d6e56ab77e28e416b013a2836307616d8c00dc26216c35fba8bc1ec0b8c8503f8d7cb55e8dd1d5aaa08875e9172f7259082a4f6756c4722be9c4e3f96e6f
-
Filesize
2.6MB
MD5fc6d40512829e36687854cb0118a5a1e
SHA1cf801f9dad93b5ebbcef79b093b034b45aa75a1e
SHA25658c0d2f945207a56f5baefbb320d7ddbd01089205025de05133db173281e65e2
SHA5128545d6e56ab77e28e416b013a2836307616d8c00dc26216c35fba8bc1ec0b8c8503f8d7cb55e8dd1d5aaa08875e9172f7259082a4f6756c4722be9c4e3f96e6f
-
Filesize
2.6MB
MD5fc6d40512829e36687854cb0118a5a1e
SHA1cf801f9dad93b5ebbcef79b093b034b45aa75a1e
SHA25658c0d2f945207a56f5baefbb320d7ddbd01089205025de05133db173281e65e2
SHA5128545d6e56ab77e28e416b013a2836307616d8c00dc26216c35fba8bc1ec0b8c8503f8d7cb55e8dd1d5aaa08875e9172f7259082a4f6756c4722be9c4e3f96e6f
-
Filesize
7.3MB
MD599f16ab6ab670935b5aa5c84b1b5f6bd
SHA159f375481cdfe246d1ddcaada9941e16dcfda297
SHA256348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
SHA512845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
Filesize
7.3MB
MD599f16ab6ab670935b5aa5c84b1b5f6bd
SHA159f375481cdfe246d1ddcaada9941e16dcfda297
SHA256348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
SHA512845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
Filesize
7.3MB
MD599f16ab6ab670935b5aa5c84b1b5f6bd
SHA159f375481cdfe246d1ddcaada9941e16dcfda297
SHA256348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
SHA512845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70