Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/03/2023, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
1.9MB
-
MD5
c744e2d74b828c767877c52e125087af
-
SHA1
444809a0b355b365fadc03e50ac577b1b1fa50eb
-
SHA256
dccb7a134aae7970fc13ab3db3737b62b733ba33627945a1d5cdf61870ff4842
-
SHA512
084e0f42ecb98a1915db1128a704a1650b07e7acffc4852cadc9684dfd643619e1668ab7ef83321483a2eaeadcd83e58379cd4db3e11a4085d74ee42bb095fff
-
SSDEEP
49152:xKcn0Cjj3zONh6qrCf2TXEUPsNq3WVAThDWZaXQZh8:ocdDZqCIbPzWVyhDWZaXQZh
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 988 ntlhost.exe -
Loads dropped DLL 5 IoCs
pid Process 1668 setup.exe 1668 setup.exe 988 ntlhost.exe 988 ntlhost.exe 988 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1668 wrote to memory of 988 1668 setup.exe 28 PID 1668 wrote to memory of 988 1668 setup.exe 28 PID 1668 wrote to memory of 988 1668 setup.exe 28 PID 1668 wrote to memory of 988 1668 setup.exe 28 PID 1668 wrote to memory of 988 1668 setup.exe 28 PID 1668 wrote to memory of 988 1668 setup.exe 28 PID 1668 wrote to memory of 988 1668 setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:988
-
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵PID:1868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255.1MB
MD56a3e1d2dc50415f781dc1c61902a5f9e
SHA14f0a5ca756a8c1a6fd7cea73dbdd5097fe8f5e3f
SHA256356bb4b19fc293fd7b50342d381606c5f931052e5ee8b46fd061a3fe1932bad3
SHA5122fef5cdc0ebd3c706dd48ad25dfb08d20c66c3faf3be97a807f8115091763e83efabd24f0aaa66a798f9aaf0a94f6df8e0a49b150d7980a9ed9b7e1c8b1292ca
-
Filesize
262.9MB
MD56b5203b38509be477e499a48408b5ecc
SHA17a509fb3d73df6c51d2cb70384df7c4154008acf
SHA256736c679408a8a145580fce277efa7d6ad9cd259509ddb1c796b5a1134833aca0
SHA5122a10f8100c994c9af64b429bf9f608ff51ad051fe83e2f619c79dc57460c1fb874be4778975301fa114d00cc3ecd3fc81c24393e86c234565c6c23839b803c8d
-
Filesize
248.1MB
MD526a1412dafc5327cf26d1e2ea2633746
SHA1b07cdc0afd96da30d314bb624eb46355ac1626e8
SHA2567130368a2dba1759fa6ec0fa55b3382be5b61fbb3c5d93c4bb829a66eff7c2aa
SHA5128f7b9b2835fea56817b780e1e5d64b4122045e6cc08fe5d0b296226f7c7c81819f0bf050086c12212ad57dbf7e9f000962c2661ec377acce654bf0271d0ab1bc
-
Filesize
139.3MB
MD59ad9a59f8e5ca94d3972d28fc298feff
SHA10703457bb4c9b9df1480f708a4bf6d3c1e946561
SHA256fafb59e5fb12cb751c268576f1e18fd25dd10e2c439d98978e36b9708733e6ff
SHA512a1fed810c20a7e596773fb5d7be0aa19a735c3683d9bf29e472712906b5320c7e1fa2a5d99fcfe6029306a2b9aca1957432987328a7a8cc5490d4189542c47d4
-
Filesize
264.3MB
MD5e30a7a9bd78ddab45b8e3eac12f3baad
SHA1dcf0a6812d6df3dced0b899bf786b11889b4ec01
SHA256c348579b32c3e9068996143977e93e8d14402abf5712d448fd9328fab5ee9988
SHA5127402bb1d6156fdfd6c39941bccb1db71efb9c5085e151e287b27eb335274bf6a6705552b5bab2c3a5c35c8a5d5b697e9c9e3a1604a9d457bf801371fd81cdd60
-
Filesize
263.6MB
MD5d198878b771069dfcae6afcd5da0d809
SHA19dc6cbd0596700986ba2d207c4face167f291922
SHA256ff28c30b94a54171d53f38a69c45915295e0a317e2ba45535353be62cf0dbbf1
SHA51227c58af255f1f89f9230956d20704b725fa79baa71cad11f0305a80c2a204a97826af10383b080d2f32673789bfaac14f2e62746ca7c64996e6cfd1b4f9d7d06
-
Filesize
264.4MB
MD5cce0798f53fb079ec884be16fec2064b
SHA10bb06b359f6640236e1dd74dd4a938929cc37e4c
SHA2563bed61fb744e7cba68d40605d4213f25160aaa6331e3dc00410239a9fe2daa26
SHA512e41ccf8fa0103301c38e3031296a54661d25073132887c629600c4d4aaaace8010ba21991647b753a93b131b28a6ed4c9152b12490d110d8b9ca589b036c0409
-
Filesize
248.8MB
MD5a28a1ab3a1c021a04b672b9483aa1e18
SHA18e10236deb02a8b7da80905f3dc24a3964d3f9b0
SHA256f5a6ca836afe72f382afd566abd24758a030659ed7b6c232e18dcf2fae26cfbe
SHA5120d61c2f5e6032263b8594b649c2c25de900c23c8bb01a1dc9a87a8883b65d2fa666c14b56a147664932fefbdadf4f4f820abc29057bbe9f9e19c2b3c0291ff3b