Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
3c29b2a85beb671f0504afc7c3e1346a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c29b2a85beb671f0504afc7c3e1346a.exe
Resource
win10v2004-20231215-en
General
-
Target
3c29b2a85beb671f0504afc7c3e1346a.exe
-
Size
12.5MB
-
MD5
3c29b2a85beb671f0504afc7c3e1346a
-
SHA1
4db3c724d1d4377bcb85ed2d625ef23867308ce9
-
SHA256
38d1de62b07f072de9aab3a81d82d3066eadf97a016504e7188864f29328b6c2
-
SHA512
89668f1629ea80ec2ebe9e754327abd34bb2b4ffbe75afdf4fe0c50a3e0198f64bf8b8fd95a9752254bc998e751edef0db9a7cf148a5c96946c98bba3cd9311f
-
SSDEEP
24576:ojDuKnh7YzbKBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB3:onh
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\lnlfrhnc = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2760 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\lnlfrhnc\ImagePath = "C:\\Windows\\SysWOW64\\lnlfrhnc\\huusrsff.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2144 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2972 huusrsff.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 2144 2972 huusrsff.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3032 sc.exe 2296 sc.exe 2828 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2444 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 28 PID 2088 wrote to memory of 2444 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 28 PID 2088 wrote to memory of 2444 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 28 PID 2088 wrote to memory of 2444 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 28 PID 2088 wrote to memory of 2852 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 31 PID 2088 wrote to memory of 2852 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 31 PID 2088 wrote to memory of 2852 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 31 PID 2088 wrote to memory of 2852 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 31 PID 2088 wrote to memory of 3032 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 32 PID 2088 wrote to memory of 3032 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 32 PID 2088 wrote to memory of 3032 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 32 PID 2088 wrote to memory of 3032 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 32 PID 2088 wrote to memory of 2296 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 34 PID 2088 wrote to memory of 2296 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 34 PID 2088 wrote to memory of 2296 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 34 PID 2088 wrote to memory of 2296 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 34 PID 2088 wrote to memory of 2828 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 36 PID 2088 wrote to memory of 2828 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 36 PID 2088 wrote to memory of 2828 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 36 PID 2088 wrote to memory of 2828 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 36 PID 2088 wrote to memory of 2760 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 39 PID 2088 wrote to memory of 2760 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 39 PID 2088 wrote to memory of 2760 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 39 PID 2088 wrote to memory of 2760 2088 3c29b2a85beb671f0504afc7c3e1346a.exe 39 PID 2972 wrote to memory of 2144 2972 huusrsff.exe 41 PID 2972 wrote to memory of 2144 2972 huusrsff.exe 41 PID 2972 wrote to memory of 2144 2972 huusrsff.exe 41 PID 2972 wrote to memory of 2144 2972 huusrsff.exe 41 PID 2972 wrote to memory of 2144 2972 huusrsff.exe 41 PID 2972 wrote to memory of 2144 2972 huusrsff.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c29b2a85beb671f0504afc7c3e1346a.exe"C:\Users\Admin\AppData\Local\Temp\3c29b2a85beb671f0504afc7c3e1346a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lnlfrhnc\2⤵PID:2444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\huusrsff.exe" C:\Windows\SysWOW64\lnlfrhnc\2⤵PID:2852
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lnlfrhnc binPath= "C:\Windows\SysWOW64\lnlfrhnc\huusrsff.exe /d\"C:\Users\Admin\AppData\Local\Temp\3c29b2a85beb671f0504afc7c3e1346a.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3032
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lnlfrhnc "wifi internet conection"2⤵
- Launches sc.exe
PID:2296
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lnlfrhnc2⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2760
-
-
C:\Windows\SysWOW64\lnlfrhnc\huusrsff.exeC:\Windows\SysWOW64\lnlfrhnc\huusrsff.exe /d"C:\Users\Admin\AppData\Local\Temp\3c29b2a85beb671f0504afc7c3e1346a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.3MB
MD5af2779b69c30e3856cb31a6d147eb8e9
SHA190a38551b45cd7ed3227c87507cf903720c85448
SHA2569214ce565c7384591227e220dcf44fb670ed33b9c6e1aacef1ebc14737e795a0
SHA51237fdeaf46b49a574a13da2d36178b4a0463d2b7ed4bff4c2d98ea5f36f9fa034888fa11dd18e873c1134dedf0eecf36274cb13f7451ef3f8ce94610a75352ebe