Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe
Resource
win10v2004-20230220-en
General
-
Target
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe
-
Size
7.3MB
-
MD5
99f16ab6ab670935b5aa5c84b1b5f6bd
-
SHA1
59f375481cdfe246d1ddcaada9941e16dcfda297
-
SHA256
348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
-
SHA512
845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70
-
SSDEEP
196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1
Malware Config
Extracted
laplas
http://185.106.92.104
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 816 svcservice.exe -
Loads dropped DLL 1 IoCs
pid Process 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 816 svcservice.exe 816 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 816 svcservice.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 908 wrote to memory of 816 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 27 PID 908 wrote to memory of 816 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 27 PID 908 wrote to memory of 816 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 27 PID 908 wrote to memory of 816 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 27 PID 908 wrote to memory of 816 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 27 PID 908 wrote to memory of 816 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 27 PID 908 wrote to memory of 816 908 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe"C:\Users\Admin\AppData\Local\Temp\348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51.4MB
MD521848fe6cfbfd73b62717baf8749233d
SHA18d599af99dc920ad7fb8be12e28e1f38c248362d
SHA2565b8a186fcf974b1fdc0f038891801552bcf1b26fdb7e817e68f651a9ec16a070
SHA5128ef9896e4b0054b72a66667e8263d7c96cf8c19d5eb0ce199cf79359c81d370dcc12289157234a0b5b94ba44a0c775b2811b01768b58318d4454cfa9b80529f4
-
Filesize
52.6MB
MD5462a1305eaee8670fbf268dd9d598857
SHA14ebf7d676a6b9573325471409b49a6d079f47d06
SHA2565123e5a945410ca58ffc58d57cf32d70d91bdd268e9854e7c2ecf90ab1b07e92
SHA5122836ff36c37ebb197e6bfcd18a98229314b7636264066031deabc6b6399c472d0771f38c8ff867256c2e95685e1b8f20a5eed19a346bda3ce42219f96769b73f
-
Filesize
53.1MB
MD5f46aefb05bd1da6a0223ff6b5a14fbfb
SHA11b2d45b0d31d059a530bfccf354297a245ed3f12
SHA2560362c265ac7c94cd220e3cb339d2dc8d94854e4e52e6c24d8d9e41a4a9001f3e
SHA5125d73e2a810654271326b568966ae88a1c17566af4700343959cbb443e480e63f8b06002763d80b80ad4fa215136caa625505704e8a06163b3c09322b08f654f2