Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/03/2023, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
8c59b0c004d6d108c494ed8e96f573bb
-
SHA1
62856aa334190053f0e3b41f7f379a77aaf1cdb1
-
SHA256
2297b0cced9fde691e8f430d0198f76227b3e617658a6119753d942f9677f589
-
SHA512
2c966dde8aa92dec51080a02a38c8ed207cd51fc8196bd6a92e3eff316bb6370c90900f3b6c0d5d06e93f34ef925c509cb2c11f3d16a0cd3dc8984f853f85a6d
-
SSDEEP
49152:mG1dhlVkEIUaOM8Tb9E4V4GwayVg53tW0S6ndKE:mG/hkPUaX8/64x0g5jS24
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1932 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 file.exe 1972 file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" file.exe -
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1932 1972 file.exe 28 PID 1972 wrote to memory of 1932 1972 file.exe 28 PID 1972 wrote to memory of 1932 1972 file.exe 28 PID 1972 wrote to memory of 1932 1972 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
502.2MB
MD5904de2f025e8c4b12f0ebf7bf0369df1
SHA19a4de65f1dda1192dc8ea58bed39c6ae4c5a1b97
SHA25627e2e146d154e484be37e439f435a8f21a5aa34e232709d95674c02e12cc3594
SHA5127c7307ed414c1aea77435bf8be72463633885a2437d62868c61721b63de3e6ab3154afacc1f31aa4861e11a22b50d16e2b398a4c0e572b4079b3baac68c31f10
-
Filesize
443.5MB
MD5c223b5f1fdce77b8986b5a8c4cb1c85b
SHA17da6975a49bd3e89ccd3317575b65e23325b8034
SHA25644e1baefdee6651ed14a563b3145b07a9c648a55b3291b4948de688aba92eb66
SHA512747099b4dea23b41b91e9699771195a6c87d844134d90acc23c04fec916cc3cac2be3bda1d5a2a92c5f9d8315a52363f442265e1c4b90e838fdfead7cc895fc6
-
Filesize
304.6MB
MD5a16d9ff3d6272d9bb454da695940f325
SHA1a2626671bc0bc41d66a2940d06678ffcb1be9973
SHA25623106c9965674adfa92e2c79e32d449eefcc12120af752a144cf0c07b5b811e2
SHA5125f34a8c87579e2ac7e5fda38683906e4ffd0418c101ea07e192e1eb0f14b4323e96eebdadf459aa5789023b00d7243a8d0fd1770a0ab731feb47af899bd1a4cc
-
Filesize
499.8MB
MD54a45e2a4cba2d26adc79aaf78e90fcc5
SHA1ffdae30db2966c05f79cdfea663f14e29d199597
SHA256545a95b0e3eab9b9e86b7d7c6cbe5d7ba95ef9910a9c2780739b888932d8f275
SHA51239efba9ad6b2ddc826ef990452c1527ed168bfba497564e9c47e09006274ab8b6142a6b32a4b9824c0124906333191e3d3a44559d79c2e8e213f4444a84994f4