Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23/03/2023, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
c744e2d74b828c767877c52e125087af
-
SHA1
444809a0b355b365fadc03e50ac577b1b1fa50eb
-
SHA256
dccb7a134aae7970fc13ab3db3737b62b733ba33627945a1d5cdf61870ff4842
-
SHA512
084e0f42ecb98a1915db1128a704a1650b07e7acffc4852cadc9684dfd643619e1668ab7ef83321483a2eaeadcd83e58379cd4db3e11a4085d74ee42bb095fff
-
SSDEEP
49152:xKcn0Cjj3zONh6qrCf2TXEUPsNq3WVAThDWZaXQZh8:ocdDZqCIbPzWVyhDWZaXQZh
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 304 ntlhost.exe -
Loads dropped DLL 5 IoCs
pid Process 1400 setup.exe 1400 setup.exe 304 ntlhost.exe 304 ntlhost.exe 304 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1400 wrote to memory of 304 1400 setup.exe 27 PID 1400 wrote to memory of 304 1400 setup.exe 27 PID 1400 wrote to memory of 304 1400 setup.exe 27 PID 1400 wrote to memory of 304 1400 setup.exe 27 PID 1400 wrote to memory of 304 1400 setup.exe 27 PID 1400 wrote to memory of 304 1400 setup.exe 27 PID 1400 wrote to memory of 304 1400 setup.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:304
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314.2MB
MD5db1b3621448d18d9291f25e4790557dc
SHA1b3a411a3664504ac1503a80d7d8958af94c6441b
SHA2560e18c9b9165f0a329e515057e01b296c24851079357434c6faf0a76238f5d8b3
SHA512548828890b9e8cf795e44c0ab8dd43440aa94fc837e3153feac8d94e52becfc26aad051ed7e28dc004640803b006b894ae6727db321afcb4c347799e5c2eea1d
-
Filesize
302.7MB
MD5075221955b05988aaf1563bc717b055d
SHA19008fad254062ee431bfe0e3995b803db2edd5c3
SHA25691a8e1af64f375c204894a0ea1946b6dcc034ae9ef2e780dccbb7846184748ac
SHA512023c9ef66c8a98c41aa299b4c02f929af64995963da36ad1e364104b7b8897bdc3e7ea14f869989160d5ba694bc025f6d85d494ad263463429e183c315982daa
-
Filesize
319.7MB
MD530c741891fc77ed4906c3be5f031b3bf
SHA170328bcecdaa18833f71a8423e5dc8cdc383797a
SHA256f08c24a26db8fa0f002716c3cdc5475b33f9350ac0caf972bab36f0919ba2460
SHA512985c637cb836d3ac259336c5559eda74fb114b087925ac8c55a588e9976cfb76cf12783bf71d5961cc2c09c7ccda5e5ffe340feb885f301ba6604fc0acc9ca22
-
Filesize
166.5MB
MD5590deab98b532131fda6ec56453ddea5
SHA18250bfa581ac35e73e36c6bdddef2582895738cc
SHA2564fb83f8473af53cbc20e3f470d841dfa6fb42dc3abf96a0036916c3a73b8b722
SHA512dffc9121c987fa87afa440ff7ed16ac392a47079e4abbc1c9522148599e46dc241e01ac2948b9f8ab4e5d234469fe45ae0df6512a3f81bc8fcc63c454c845a1e
-
Filesize
301.9MB
MD53de00f7475ce4c005ed0738c17b49364
SHA162b8d60154f78f678d375e1a6ad76cd427a7c594
SHA256e59dbf241ff4bf1fb7a36e8df62acdcabb2419a286382b3fc9c30d3a23eea0c5
SHA512ddd0e0a053eb1cde083a68a743126b9b1c416db7adac46f79a54e9b043f2355840662cfac713e52f3be9273c0b594ff5453c99e36c87fc1df6b72cf4a8f178b5
-
Filesize
303.4MB
MD5e64b2b33dd0702556d7031ac7b582545
SHA189e22ce3c0d7812cb165363c73e6a7ba10ae30ad
SHA256782d440ee5d5f74f8384c124715e69276823748933425e8f828675b782cd9b63
SHA5122c85d80e202062a69d8a72f5c656ab01b8f4d0d09e55f0c21350cb0782613bac72a03b4a6dbc47f382167b350247cac8458eddc1f78d4a231b73a807649f79dd
-
Filesize
316.0MB
MD510678a95ee3e389513f7a46c2e45c491
SHA1940d3b15a139c1d04ab0bb682970e129232c6ddd
SHA2566c486f8fb598ad768090fd3a3761c9bc837847ed5c5240b0166fda773760968b
SHA51218939a52132d9cd29b072e20c7ec99d33c28bb1b75eb22f6948c8816c4c0b6371d66a1cd05ebfa7ae4a614720392b83157e869616baa4cc81c29c02ca038e44c
-
Filesize
295.9MB
MD5879c1ce6a07dacc0e6c5a4e1ff241a46
SHA1b570b4f4de7ab3b41a11602cd8906e6cbf6cabbb
SHA25622633e849d6d1ebf5e5a930fb1f09c27d80ed29a27d22fe007694708171e16de
SHA51293e95ba3105afe1a0e084a3fa69fca4cadce53831a8e55a01a7d71eba21d150e0291e0b17a053a5bb9ee08f42c4fe7c3b07d7591430cc3a79e3427b58e5ae8ad