Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
25c2cb4f8d5065c286d0b9592d9e87c3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
25c2cb4f8d5065c286d0b9592d9e87c3.exe
Resource
win10v2004-20231222-en
General
-
Target
25c2cb4f8d5065c286d0b9592d9e87c3.exe
-
Size
31KB
-
MD5
25c2cb4f8d5065c286d0b9592d9e87c3
-
SHA1
0a661db38fb68a4c5f34e906f0abae9f534fa1bd
-
SHA256
013bf1d566645964f4dc1cfd31d16badad06dffeb0c2aece57f6a7066e02776b
-
SHA512
dc8571a5410a9a2cf2354122a12486df43fe85c5a4be23e7290687b7acefbec28c2cb3c9b44ecfff95357e1768436ce96f1e3ac6812129f936d69c71d1653593
-
SSDEEP
384:sy1/LoKfNC/gOlkikHX9Pzf8Xk1X4ViA+oo//xxjAaPnc9+TOQVswSk9uQbjth7m:sj/g8gHCXk1Xb7CxeswN9gx
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 25c2cb4f8d5065c286d0b9592d9e87c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\LGootkitSSO = "{CE44F0FE-6137-4009-A856-8A51BBC94E33}" 25c2cb4f8d5065c286d0b9592d9e87c3.exe -
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe 2676 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\lmsxsltsso.dll 25c2cb4f8d5065c286d0b9592d9e87c3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2548 set thread context of 2176 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CE44F0FE-6137-4009-A856-8A51BBC94E33}\InProcServer32 25c2cb4f8d5065c286d0b9592d9e87c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 25c2cb4f8d5065c286d0b9592d9e87c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 25c2cb4f8d5065c286d0b9592d9e87c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CE44F0FE-6137-4009-A856-8A51BBC94E33} 25c2cb4f8d5065c286d0b9592d9e87c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CE44F0FE-6137-4009-A856-8A51BBC94E33}\InProcServer32\ = "C:\\Windows\\SysWow64\\lmsxsltsso.dll" 25c2cb4f8d5065c286d0b9592d9e87c3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2176 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe 20 PID 2548 wrote to memory of 2176 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe 20 PID 2548 wrote to memory of 2176 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe 20 PID 2548 wrote to memory of 2176 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe 20 PID 2548 wrote to memory of 2176 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe 20 PID 2548 wrote to memory of 2176 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe 20 PID 2548 wrote to memory of 2176 2548 25c2cb4f8d5065c286d0b9592d9e87c3.exe 20 PID 2176 wrote to memory of 2676 2176 25c2cb4f8d5065c286d0b9592d9e87c3.exe 19 PID 2176 wrote to memory of 2676 2176 25c2cb4f8d5065c286d0b9592d9e87c3.exe 19 PID 2176 wrote to memory of 2676 2176 25c2cb4f8d5065c286d0b9592d9e87c3.exe 19 PID 2176 wrote to memory of 2676 2176 25c2cb4f8d5065c286d0b9592d9e87c3.exe 19 PID 2176 wrote to memory of 2676 2176 25c2cb4f8d5065c286d0b9592d9e87c3.exe 19 PID 2176 wrote to memory of 2892 2176 25c2cb4f8d5065c286d0b9592d9e87c3.exe 18 PID 2176 wrote to memory of 2892 2176 25c2cb4f8d5065c286d0b9592d9e87c3.exe 18 PID 2176 wrote to memory of 2892 2176 25c2cb4f8d5065c286d0b9592d9e87c3.exe 18 PID 2176 wrote to memory of 2892 2176 25c2cb4f8d5065c286d0b9592d9e87c3.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\25c2cb4f8d5065c286d0b9592d9e87c3.exe"C:\Users\Admin\AppData\Local\Temp\25c2cb4f8d5065c286d0b9592d9e87c3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\25c2cb4f8d5065c286d0b9592d9e87c3.exe"C:\Users\Admin\AppData\Local\Temp\25c2cb4f8d5065c286d0b9592d9e87c3.exe"2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2176
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\25C2CB~1.EXE" >> NUL1⤵
- Deletes itself
PID:2892
-
C:\Windows\SysWOW64\svchost.exesvchost.exe1⤵
- Loads dropped DLL
PID:2676