Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/04/2023, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
Lazzarus2.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Lazzarus2.rar
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
Lazzarus2.rar
Resource
win10v2004-20230220-en
General
-
Target
Lazzarus2.rar
-
Size
53.2MB
-
MD5
8825f469c3334bd4cc4155875c466e84
-
SHA1
5a5feb244d437c9117a415bc5a952610e7b8a635
-
SHA256
18edd0855674bf4a15b77392976131b598a0ff21de4be2b7334131eae04205ce
-
SHA512
9155765d2da6772072b45895cf80616f18ad1a874039e82a5770b179ecc39d8f169ea3d260d8f47cae4a74529b053768ff6f8e2f82b4765f565e6ae55db23236
-
SSDEEP
1572864:3dQwKAN1pFs4vGNlLz9gv4HWJXOdJlLdWt3VmQX2Eya1:3CwJGrLz9j2JC/LdWpNya1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 836 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 836 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe 836 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 836 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 948 wrote to memory of 580 948 cmd.exe 29 PID 948 wrote to memory of 580 948 cmd.exe 29 PID 948 wrote to memory of 580 948 cmd.exe 29 PID 580 wrote to memory of 836 580 rundll32.exe 30 PID 580 wrote to memory of 836 580 rundll32.exe 30 PID 580 wrote to memory of 836 580 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Lazzarus2.rar1⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lazzarus2.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Lazzarus2.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:836
-
-