Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
1bc65d04c6c226b94dd69dab82b71963.exe
Resource
win7-20231215-en
General
-
Target
1bc65d04c6c226b94dd69dab82b71963.exe
-
Size
381KB
-
MD5
1bc65d04c6c226b94dd69dab82b71963
-
SHA1
3baab18e077adaec6b2425ea12a40cea69519a5b
-
SHA256
b881cbf09afdfebad4498fc26069d795dedbd2b94615b0525a9471037243539e
-
SHA512
ceeabb833fc9a997f8e345daf67a239d8267ba98cc425248e0cc7c39e5219c6587902ac772a1e3bac9ce598c4613d0b0eb94ae97a2d6d712310d660886973d6a
-
SSDEEP
6144:mRqmpp+amNOGokzLyM9tsLAitQo6tzOKkzIt8gKyfjxfR9D2j4y6yCZ4IGfF:WqmpplpGoGL3etQoMiXM8gxf/Sj4yy4t
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0006000000023239-39.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 3580 lncom_.exe 768 lncom.exe -
resource yara_rule behavioral2/files/0x000400000001e716-12.dat upx behavioral2/memory/768-17-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/files/0x000400000001e716-15.dat upx behavioral2/files/0x000400000001e716-14.dat upx behavioral2/memory/4056-26-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-35-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/files/0x0006000000023237-36.dat upx behavioral2/memory/768-55-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4056-53-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/files/0x0006000000023237-34.dat upx behavioral2/files/0x0006000000023236-30.dat upx behavioral2/files/0x0006000000023235-25.dat upx behavioral2/files/0x0006000000023235-24.dat upx behavioral2/memory/4544-58-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-61-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-64-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-66-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-68-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-70-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-72-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-74-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-76-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-78-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-80-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-82-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-84-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-86-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4544-88-0x0000000000400000-0x00000000005FC000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\lncom.exe 1bc65d04c6c226b94dd69dab82b71963.exe File created C:\Windows\SysWOW64\lncom_.exe 1bc65d04c6c226b94dd69dab82b71963.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4800 wrote to memory of 3580 4800 Process not Found 81 PID 4800 wrote to memory of 3580 4800 Process not Found 81 PID 4800 wrote to memory of 3580 4800 Process not Found 81 PID 4800 wrote to memory of 768 4800 Process not Found 82 PID 4800 wrote to memory of 768 4800 Process not Found 82 PID 4800 wrote to memory of 768 4800 Process not Found 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bc65d04c6c226b94dd69dab82b71963.exe"C:\Users\Admin\AppData\Local\Temp\1bc65d04c6c226b94dd69dab82b71963.exe"1⤵
- Drops file in System32 directory
PID:4800 -
C:\Windows\SysWOW64\lncom_.exe"C:\Windows\system32\lncom_.exe"2⤵
- Executes dropped EXE
PID:3580
-
-
C:\Windows\SysWOW64\lncom.exe"C:\Windows\system32\lncom.exe"2⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe3⤵PID:4056
-
C:\Windows\services.exeC:\Windows\services.exe -XP4⤵PID:4544
-
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc5⤵PID:2388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc6⤵PID:2792
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP srservice5⤵PID:4564
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\lncom.exe.bat3⤵PID:3196
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice1⤵PID:3264
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5597762c0c7f4283f8c6844b2d59abfc1
SHA177ab95fb35e730c96cfd2f299b2b347535783fcd
SHA256a127e7c60e1774482d65c8ebaa8a33cfd46e994e328aaceaf997f7d11bcdc7f5
SHA512926b55483a2ac520fad3e3b51cf5ab10949eed116597729795b6603ed0623589f55428ee97c9ac5d6ec81c6cab03db6c56c86432827f8e635e506311f1bfcc75
-
Filesize
136KB
MD52c4344978c3a0d85503975a38c49f8b6
SHA17f93cc0c5f0b82ebc966eb9f09c96dbc1e6a8522
SHA256fdf0fb26fdfc1538760451c92793b3183cdd95cae930245c57142745bc0fba5f
SHA5120bd47b05ada2e80706cc84d62345356e23c7a17f6922d446bff33f165007455b6b434424bba28acfb85aaa8206f8b28bd6b5bb887e3839708883648d1f0462f3
-
Filesize
30KB
MD5f4baea575b03d9e0783dd5e2d874a2b6
SHA1b09fe45cd503d58354d88c1db64924a5dc76f61f
SHA25642607d705a219ab17aee25e77c96662fe2d518a4b368d355e97978ffba6423e2
SHA5124c7561fdf6eb7989667273f18bd95c146962bca9c608d6b7ba711c19767bec41379ede30618f63930e7149b7643b681cf41c5b5270596cf15a6732a95918c2c6
-
Filesize
29KB
MD5eec3ebfe28ba55f73356bac7c69de9ac
SHA1fa641341005e4f787ec1727e26f361b23634ae85
SHA2568a3f70a3bc0204436f0ca42afb88317571fc309233bb1a9c93d761b8855847d8
SHA512257bc71664915ba9d9123e8dbd5f94597bc8be268680fdc22f7a6ea844f8715ee98031b18a408974a750485fa220d8f9ef347e30a7f680d3f77a81e13b88f21c
-
Filesize
40KB
MD51ae206763a8c4e04d892d8247edd8448
SHA104ce37337090c08b0a662e3a150dab921d08e615
SHA256f4ef65ca18259ba1ae076b235e6ead13ce7f130a454604f063930c20a6bb6438
SHA5122031f36e7a4c3bb7c83a5ff102ac6c26ee2e5ffe889a9aa91d2de7ff7c7d5c5091f3a3c9e0d39d073634b36da664f2cb322ac872bd4aabfed3b2608609a51f19
-
Filesize
99B
MD51f73e450d92934cd37c041eb3f1ff51f
SHA1f3e9dece5d6b7d7a0e4966c16ffe31437539d4a0
SHA2563a57d154715459926a51a9e3925687c0c78ec9c88bc39c303b5b93385d34d67e
SHA5125f982d614e54870ae3ad212f049ca3685602812c1bb066a5f6155e694adb994d6d1608ca7a25bcab605812c6e7e6b22817aaf0dba9e906787add9b0a8e3f32a5
-
Filesize
35KB
MD51bbe77facc3af81c6726894555effac5
SHA1bcf5cd69ef7b1f2da1fcb7d148e0d38558ed6e04
SHA256c3971a22e1247b009c4227ec87799b54171134c75401d24764433fc7cbb23e36
SHA5121ffc5b228cb24e6bc15006e023ad3e758f085bd3ef2f91d8b1c615dd889c226bd03b06055dcbbe0d40b2fefdcfe2071e29b767454b54647e1afd0946d92a0164
-
Filesize
1KB
MD57d22e72fdb2e7b3aa6da3114145ea840
SHA1c713c0c79fbe65349f359dd6b96d859d6269a4e9
SHA256c636a1a1ec7d708cbae1b10d1c6350c6bdf3f97851b8cce40e758db128486929
SHA5128cd4f3e23280dcd34ee5f1b0e5e90a25d42a219de87456678eea65d750800df00804375fee76b92d97533c14fa850631ec78ef5c90f5c080474f8c48bbd2b674
-
Filesize
36KB
MD5562e0d01d6571fa2251a1e9f54c6cc69
SHA183677ad3bc630aa6327253c7b3deffbd4a8ce905
SHA256c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6
SHA512166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea
-
Filesize
13KB
MD5b4c72da9fd1a0dcb0698b7da97daa0cd
SHA1b25a79e8ea4c723c58caab83aed6ea48de7ed759
SHA25645d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f
SHA512f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066
-
Filesize
168KB
MD560d2ed67e2e4e363c06af6d5379b3bd4
SHA1ffbe4e49dfe3170bf7245c20866bdba3f118f1d9
SHA256222f6f5387ee4f861f4d3d3fbb9d19e95dc8158753f4a05cf490af0ec27c6cd7
SHA512f3e893838f43b5cf7887d8b2eef309582d86097ad605fafd63c60d959c53c31a63fcfde4e6816e62704973a6ae07dc8113e03297a9681933ad48e2b480aa0885
-
Filesize
1KB
MD5cdc698871f534be75a7a042a09238941
SHA1f20fba01242f1458eb351f2cdc479348b2ccf8f7
SHA2567179cb4034dc1100bd008ee86af7b8670ffa9c739ab0377bc406b4ac61fed569
SHA5128aa64985e7a0815b59c0f03875176289de4136572681ec4e0631d9663f48964ac4958adfe9af11e6b3ef00762031d708229609136445caff61e73d9bc47f0f11
-
Filesize
157KB
MD5efeacc57ac87db10150589107287d44c
SHA1b6fa9f435eb7a9bd5366754ecb5c5b848f7702cc
SHA256b77025009fae1a36b3f365b43151eaeda838cdfc58bfadc0d95b9d17a52ff0de
SHA512db622b8689422985aa456bc5eecc750d4072b22c52d17b114efe1c66f6b989761593487208780d2cc6cb2987c0879d7d2dd6856fa4384557cd37c2fa6efa80f7