Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2023, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
LadaCuScule-6.113-amd64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LadaCuScule-6.113-amd64.exe
Resource
win10v2004-20230220-en
General
-
Target
LadaCuScule-6.113-amd64.exe
-
Size
1.8MB
-
MD5
c1d090b29c5550d995f4eff4c3599a5d
-
SHA1
45a4102e3fc0ed02dd9865928680c214e3a27d37
-
SHA256
ec5e76fc15c50ca01076bf4f22ce1de6ba1d670dedfdcc4142cdeda1d0da0899
-
SHA512
b5e218219a4953ee958a85ab7db76d298dd29bd069cc23d0b211297495d9babd85346630d7ff00707a02ef0ca5fc75d82d99a97a19694ab1e7d08034ddc6c1c7
-
SSDEEP
49152:W8fDQwdhJtWAcDi9148d0FB6d4YUvtsfco1C:QOvtWAc2z47Fod4Z2fX1C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3048 ns7670.tmp -
Loads dropped DLL 7 IoCs
pid Process 3772 LadaCuScule-6.113-amd64.exe 3772 LadaCuScule-6.113-amd64.exe 3772 LadaCuScule-6.113-amd64.exe 3772 LadaCuScule-6.113-amd64.exe 3772 LadaCuScule-6.113-amd64.exe 3772 LadaCuScule-6.113-amd64.exe 3772 LadaCuScule-6.113-amd64.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini LadaCuScule-6.113-amd64.exe File opened for modification C:\Windows\System32\GroupPolicy LadaCuScule-6.113-amd64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3772 wrote to memory of 4408 3772 LadaCuScule-6.113-amd64.exe 86 PID 3772 wrote to memory of 4408 3772 LadaCuScule-6.113-amd64.exe 86 PID 3772 wrote to memory of 3048 3772 LadaCuScule-6.113-amd64.exe 88 PID 3772 wrote to memory of 3048 3772 LadaCuScule-6.113-amd64.exe 88 PID 3048 wrote to memory of 4796 3048 ns7670.tmp 90 PID 3048 wrote to memory of 4796 3048 ns7670.tmp 90 PID 3772 wrote to memory of 3852 3772 LadaCuScule-6.113-amd64.exe 91 PID 3772 wrote to memory of 3852 3772 LadaCuScule-6.113-amd64.exe 91 PID 3772 wrote to memory of 4500 3772 LadaCuScule-6.113-amd64.exe 93 PID 3772 wrote to memory of 4500 3772 LadaCuScule-6.113-amd64.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\LadaCuScule-6.113-amd64.exe"C:\Users\Admin\AppData\Local\Temp\LadaCuScule-6.113-amd64.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SYSTEM32\cscript.execscript.exe "C:\Users\Admin\AppData\Local\Temp\nst6C4D.tmp\icf.vbs" get2⤵PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\nst6C4D.tmp\ns7670.tmp"C:\Users\Admin\AppData\Local\Temp\nst6C4D.tmp\ns7670.tmp" SchTasks.exe /query /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /NH /HRESULT2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SYSTEM32\SchTasks.exeSchTasks.exe /query /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /NH /HRESULT3⤵PID:4796
-
-
-
C:\Windows\SYSTEM32\certutil.execertutil.exe -verifystore Root 008144d712922d4f29168a16fef21c66576317df2⤵PID:3852
-
-
C:\Windows\SYSTEM32\certutil.execertutil.exe -verifystore Root 6393703c54b4b780af37ea6fa9b40723ff014c762⤵PID:4500
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD59b949a75a6653b40ba33f1e256c1d1dd
SHA133dd8be79632e1de9dd1552f3377301efe5a3ccf
SHA2563cba70ded615758f626fbfdd22041dc8c8641b9732808a7249d525c8a615738d
SHA51229279c0219997ce536e91adc35e28c4582a4c29a7c4d120949057bd66ad209f1dc585fc286f9bf863831a730258fdb10a86d195b276635f3618a51c7be55aafe
-
Filesize
10KB
MD5cd666abb7369f040296a3c15307ea22d
SHA1e4fc79975a1c22e982bd87d00d06eda61733ebd0
SHA2567ca0219fcde222519adaaca31d804582c4fca0df58f0ec6395456a5b2c5769b1
SHA512aa02fc4210275cf9438882e617ad5d3bdedfe665ca43600e6f1c6467ee338a578539d0a9fd7ebd350f30d94845bcf681bf7bbeec5e7e65bb394cbe57afff7a8e
-
Filesize
10KB
MD5cd666abb7369f040296a3c15307ea22d
SHA1e4fc79975a1c22e982bd87d00d06eda61733ebd0
SHA2567ca0219fcde222519adaaca31d804582c4fca0df58f0ec6395456a5b2c5769b1
SHA512aa02fc4210275cf9438882e617ad5d3bdedfe665ca43600e6f1c6467ee338a578539d0a9fd7ebd350f30d94845bcf681bf7bbeec5e7e65bb394cbe57afff7a8e
-
Filesize
10KB
MD5cd666abb7369f040296a3c15307ea22d
SHA1e4fc79975a1c22e982bd87d00d06eda61733ebd0
SHA2567ca0219fcde222519adaaca31d804582c4fca0df58f0ec6395456a5b2c5769b1
SHA512aa02fc4210275cf9438882e617ad5d3bdedfe665ca43600e6f1c6467ee338a578539d0a9fd7ebd350f30d94845bcf681bf7bbeec5e7e65bb394cbe57afff7a8e
-
Filesize
10KB
MD5cd666abb7369f040296a3c15307ea22d
SHA1e4fc79975a1c22e982bd87d00d06eda61733ebd0
SHA2567ca0219fcde222519adaaca31d804582c4fca0df58f0ec6395456a5b2c5769b1
SHA512aa02fc4210275cf9438882e617ad5d3bdedfe665ca43600e6f1c6467ee338a578539d0a9fd7ebd350f30d94845bcf681bf7bbeec5e7e65bb394cbe57afff7a8e
-
Filesize
3.9MB
MD5ebdff0a35f71bea6464584536384f328
SHA10cb1ed91a290183d17ef405e38828edfc47c0922
SHA2560161a430c6f7eb30725512cab0a3c0f8cc605bfae1a13eac515d6d2d96e9c342
SHA512595d7130534792c307b5f94acb049384f6a1d923016bfaa2615c5edd6dadfea06596192c9336adfc691f2c9600db3e2333b2d0dbfac1f9d3e6d9240e22bfd444
-
Filesize
48KB
MD560b75af545e16500ca0f18aa1ad50193
SHA154eef3cb4f818e281b23888ca9a4c45d2688e5f4
SHA2565dfbc25d61c7e8e2747fde3d79f4361fc51d366b3d23ba97ca19702c4815e494
SHA512fae5da2aca2a41d463bcf8e13d407ff14c690eb74a4b3ea6c0c15604fda8a15f3a24497c51feeec5433c1b3ff5d3217fd9e23380ed3eaf7953b56a96ce0750ba
-
Filesize
24KB
MD56833add83e5dd26ac5a8e2a91b69498f
SHA1b5bc81ab25c65c927ea1dbab3562376ac0700283
SHA2568c17f0f43e73a834ec37d696b442b9b18723f42f5d5156d97fab05280de3b917
SHA5128b84417d14507a81fad781714a06518f81749f34478e5f18d27a6fa74918ad83d78dc0cd2e0cb80d437d4fea2e04f782ae014251a2dc54e6c4032e1a9dc6e22a
-
Filesize
3KB
MD57c76270a153792ab06f8b43356f96e11
SHA1ae6e6eac704b6b589d184257d305de74a1002bb3
SHA256111fb9971a3efea1bc69223adb1e80970ea921a89bd3ad52cd682e0b9561e31d
SHA51229a091a39e59090f48df60d829659c1d29d5cad1f696930499513b1aa5e0047bd6dcc4d65e2dd3c69250f517fdc6d9b6273ec585a9048db402f11396f1776e4c
-
Filesize
10KB
MD54df69394331d88c7b88922297e3b4538
SHA16e55851decf06f4e1d567aa516d023987809f819
SHA256916e75fdb0e0e22fb260167f6a98cf60fb6e475833af2871114e35bad548eaf2
SHA512dbd66e947efddc21fbe60ccd6be9e8d0f813d90fde1734c83ddfaeeeb3307e10d2c0ffea059f8d5bb2410d42ec4e12a41e8c113f75b1f18dfa71ecf84aa74165
-
Filesize
10KB
MD54df69394331d88c7b88922297e3b4538
SHA16e55851decf06f4e1d567aa516d023987809f819
SHA256916e75fdb0e0e22fb260167f6a98cf60fb6e475833af2871114e35bad548eaf2
SHA512dbd66e947efddc21fbe60ccd6be9e8d0f813d90fde1734c83ddfaeeeb3307e10d2c0ffea059f8d5bb2410d42ec4e12a41e8c113f75b1f18dfa71ecf84aa74165
-
Filesize
10KB
MD526f32e0043b780fc5b96cf3ecc904ab6
SHA12658456923cc1d677dc0616d9ce26863b19b5bd1
SHA256e1cc2b5b2fa129dd6cddd39f06f9ee48a3c68d95a37ac7711bd55ff95ab4987a
SHA5124b157370bcd91179e6a30704d7a29a9131d47dde9c25bff186fe80437b4ba28668fef800296492bda84ee05018c6e0338ac5b90fe6bcecdeac1e43c4b6fae621
-
Filesize
10KB
MD526f32e0043b780fc5b96cf3ecc904ab6
SHA12658456923cc1d677dc0616d9ce26863b19b5bd1
SHA256e1cc2b5b2fa129dd6cddd39f06f9ee48a3c68d95a37ac7711bd55ff95ab4987a
SHA5124b157370bcd91179e6a30704d7a29a9131d47dde9c25bff186fe80437b4ba28668fef800296492bda84ee05018c6e0338ac5b90fe6bcecdeac1e43c4b6fae621
-
Filesize
11B
MD5ec3584f3db838942ec3669db02dc908e
SHA18dceb96874d5c6425ebb81bfee587244c89416da
SHA25677c7c10b4c860d5ddf4e057e713383e61e9f21bcf0ec4cfbbc16193f2e28f340
SHA51235253883bb627a49918e7415a6ba6b765c86b516504d03a1f4fd05f80902f352a7a40e2a67a6d1b99a14b9b79dab82f3ac7a67c512ccf6701256c13d0096855e