Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/09/2023, 11:22
230918-ngklgsgh6w 818/09/2023, 11:20
230918-nfx57agh51 718/09/2023, 04:17
230918-ewdbaaeh8s 3Analysis
-
max time kernel
33s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
LCALPC.exe
Resource
win10v2004-20230915-en
General
-
Target
LCALPC.exe
-
Size
3.3MB
-
MD5
4c268a0c963b7809565ce22c296a8c79
-
SHA1
8c218f1d34d56a4feae367e019c958175286c993
-
SHA256
112a0ff26e12fdd7fd499eec86d2050fa12eb5d9a74ec9f5cfc820c676f88409
-
SHA512
1e6372a932832e4df14adb7d584fce6d594571354d753af597a46f60936d4d492543d07f3158c3c4b85dd8303300095d090b28b08426415c0305bd06b095f851
-
SSDEEP
49152:XX3YnLOQYsZfQ74C6SkgSbXP31+frjUYuHi7nT8poTMFvfuJ1kZ7NrjHQe85QB:XlRsZ47/QXoHUOfAoj1x6B
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation LCALPC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry LCALPC.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133395096847321608" LCALPC.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4280 wmic.exe Token: SeSecurityPrivilege 4280 wmic.exe Token: SeTakeOwnershipPrivilege 4280 wmic.exe Token: SeLoadDriverPrivilege 4280 wmic.exe Token: SeSystemProfilePrivilege 4280 wmic.exe Token: SeSystemtimePrivilege 4280 wmic.exe Token: SeProfSingleProcessPrivilege 4280 wmic.exe Token: SeIncBasePriorityPrivilege 4280 wmic.exe Token: SeCreatePagefilePrivilege 4280 wmic.exe Token: SeBackupPrivilege 4280 wmic.exe Token: SeRestorePrivilege 4280 wmic.exe Token: SeShutdownPrivilege 4280 wmic.exe Token: SeDebugPrivilege 4280 wmic.exe Token: SeSystemEnvironmentPrivilege 4280 wmic.exe Token: SeRemoteShutdownPrivilege 4280 wmic.exe Token: SeUndockPrivilege 4280 wmic.exe Token: SeManageVolumePrivilege 4280 wmic.exe Token: 33 4280 wmic.exe Token: 34 4280 wmic.exe Token: 35 4280 wmic.exe Token: 36 4280 wmic.exe Token: SeIncreaseQuotaPrivilege 4280 wmic.exe Token: SeSecurityPrivilege 4280 wmic.exe Token: SeTakeOwnershipPrivilege 4280 wmic.exe Token: SeLoadDriverPrivilege 4280 wmic.exe Token: SeSystemProfilePrivilege 4280 wmic.exe Token: SeSystemtimePrivilege 4280 wmic.exe Token: SeProfSingleProcessPrivilege 4280 wmic.exe Token: SeIncBasePriorityPrivilege 4280 wmic.exe Token: SeCreatePagefilePrivilege 4280 wmic.exe Token: SeBackupPrivilege 4280 wmic.exe Token: SeRestorePrivilege 4280 wmic.exe Token: SeShutdownPrivilege 4280 wmic.exe Token: SeDebugPrivilege 4280 wmic.exe Token: SeSystemEnvironmentPrivilege 4280 wmic.exe Token: SeRemoteShutdownPrivilege 4280 wmic.exe Token: SeUndockPrivilege 4280 wmic.exe Token: SeManageVolumePrivilege 4280 wmic.exe Token: 33 4280 wmic.exe Token: 34 4280 wmic.exe Token: 35 4280 wmic.exe Token: 36 4280 wmic.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4940 LCALPC.exe 4940 LCALPC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4280 4940 LCALPC.exe 80 PID 4940 wrote to memory of 4280 4940 LCALPC.exe 80 PID 4940 wrote to memory of 1124 4940 LCALPC.exe 85 PID 4940 wrote to memory of 1124 4940 LCALPC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\LCALPC.exe"C:\Users\Admin\AppData\Local\Temp\LCALPC.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\LCALPC.exe"C:\Users\Admin\AppData\Local\Temp\LCALPC.exe" connect --disableUpdate=1 --hideConsole=1 --exitPID=49402⤵
- Modifies data under HKEY_USERS
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\746CC6E6608D0187EA705E1DB5203EF1E13324FC
Filesize1KB
MD5945b4e542349bfc2ce8d9ee83e792b64
SHA106bff638c1ca9f400b08b38d568645340e95416f
SHA256da65060b556b2789a5e3b8ae0ac2cf2edcc43dc8c79273dc27832d4f87677852
SHA51267b2d70fa9ebf6a1863edeb74df491657067bd051e845150afa8d74d72d1f8e10da39e225d56dee43045698eeebf9a0a10d788799f4917f2d41cf155a614b102