Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2023, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1948 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1980 conhost.exe 1980 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1948 1980 conhost.exe 27 PID 1980 wrote to memory of 1948 1980 conhost.exe 27 PID 1980 wrote to memory of 1948 1980 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532.4MB
MD54c09076c883bb80da1f1a2103c9154a0
SHA1d2cc801f2ee3eb6430b65641a261113e25caa9fb
SHA256dc68977bea776aaaca5a2b234ff7dc0d83e730be6db942e5a5580c113437a1be
SHA5129129592c007d034a006ec665d477a0824e341b001b434de3afe9d9269ce8b25fb5d273e4d7ce4117d5bcb933cfe170117764b5834697a867461dde20b06d6521
-
Filesize
529.3MB
MD55d8084ef4646f58ba5fdc652f43e6400
SHA1a77bfc301afc381267a8edd4e4ae36ad10f76ede
SHA25631c57559ca3ae7672fa7faa4ee37937259d32d9dab4e3762b00d881d5ec4c82a
SHA512c758f7ddc3854ba7a9a5dd2a26fcc9dfb6503edacb621672c09092fdd25fe7bcdac72d8fe0b9d033718ca23cda5adc882f525d98a81bf85bf2fb2d7ae2d28970
-
Filesize
537.0MB
MD56fdcbe2fc41f1b8565f57e9c48a99b31
SHA1e4b855e4b6be83b0c330384181811f5a40fce96f
SHA256e706ae56fd1271ca5c005e15ded6f6712c3a01cd8e02ef1549759f3cf54f3d3b
SHA5128d96418b6e3defc0d36fd24c6dea6dfc2792b1898d203c229e3c4daf09680bff2f11d0078a7c701a375e3260e47248ea318727a806353b0117745b6c2f80b735