Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
7924b3ad929eff3bb829b98188e429cb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7924b3ad929eff3bb829b98188e429cb.exe
Resource
win10v2004-20231215-en
General
-
Target
7924b3ad929eff3bb829b98188e429cb.exe
-
Size
175KB
-
MD5
7924b3ad929eff3bb829b98188e429cb
-
SHA1
76677c8ec5afd372d68685880398ecd41f398aa4
-
SHA256
702a1abdec48dfd9725a8cbe2d21241bde50063231f4a129312e0bb02b9d8ae2
-
SHA512
fb6e0b149c056735cd12f06f75402ba3aba031b11af99dc0a500263ef5e575196f1634e0f420bbb70cc880d151153fe955215161db05e5c181e3404d4491e5d3
-
SSDEEP
3072:PZV/+YEUCqjwhP0rWI39ijdPEwmiNBtAIpmw8cAmqeCew2fITOrUMMnMMMMMX7Iy:P//+YEUt39ijqw/tAdw8cAy42fI7MMnD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 lotih.exe -
Loads dropped DLL 1 IoCs
pid Process 2924 7924b3ad929eff3bb829b98188e429cb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D1035428-20A1-80A4-E50D-691E1C6CEBAD} = "C:\\Users\\Admin\\AppData\\Roaming\\Muuwu\\lotih.exe" lotih.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2924 set thread context of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Privacy 7924b3ad929eff3bb829b98188e429cb.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 7924b3ad929eff3bb829b98188e429cb.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C lotih.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 lotih.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 lotih.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\0CA9688A-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2924 7924b3ad929eff3bb829b98188e429cb.exe 2924 7924b3ad929eff3bb829b98188e429cb.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe 3036 lotih.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2924 7924b3ad929eff3bb829b98188e429cb.exe Token: SeSecurityPrivilege 2924 7924b3ad929eff3bb829b98188e429cb.exe Token: SeSecurityPrivilege 2924 7924b3ad929eff3bb829b98188e429cb.exe Token: SeManageVolumePrivilege 1684 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1684 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1684 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3036 2924 7924b3ad929eff3bb829b98188e429cb.exe 28 PID 2924 wrote to memory of 3036 2924 7924b3ad929eff3bb829b98188e429cb.exe 28 PID 2924 wrote to memory of 3036 2924 7924b3ad929eff3bb829b98188e429cb.exe 28 PID 2924 wrote to memory of 3036 2924 7924b3ad929eff3bb829b98188e429cb.exe 28 PID 3036 wrote to memory of 1128 3036 lotih.exe 9 PID 3036 wrote to memory of 1128 3036 lotih.exe 9 PID 3036 wrote to memory of 1128 3036 lotih.exe 9 PID 3036 wrote to memory of 1128 3036 lotih.exe 9 PID 3036 wrote to memory of 1128 3036 lotih.exe 9 PID 3036 wrote to memory of 1168 3036 lotih.exe 8 PID 3036 wrote to memory of 1168 3036 lotih.exe 8 PID 3036 wrote to memory of 1168 3036 lotih.exe 8 PID 3036 wrote to memory of 1168 3036 lotih.exe 8 PID 3036 wrote to memory of 1168 3036 lotih.exe 8 PID 3036 wrote to memory of 1216 3036 lotih.exe 7 PID 3036 wrote to memory of 1216 3036 lotih.exe 7 PID 3036 wrote to memory of 1216 3036 lotih.exe 7 PID 3036 wrote to memory of 1216 3036 lotih.exe 7 PID 3036 wrote to memory of 1216 3036 lotih.exe 7 PID 3036 wrote to memory of 2196 3036 lotih.exe 5 PID 3036 wrote to memory of 2196 3036 lotih.exe 5 PID 3036 wrote to memory of 2196 3036 lotih.exe 5 PID 3036 wrote to memory of 2196 3036 lotih.exe 5 PID 3036 wrote to memory of 2196 3036 lotih.exe 5 PID 3036 wrote to memory of 2924 3036 lotih.exe 1 PID 3036 wrote to memory of 2924 3036 lotih.exe 1 PID 3036 wrote to memory of 2924 3036 lotih.exe 1 PID 3036 wrote to memory of 2924 3036 lotih.exe 1 PID 3036 wrote to memory of 2924 3036 lotih.exe 1 PID 2924 wrote to memory of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 PID 2924 wrote to memory of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 PID 2924 wrote to memory of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 PID 2924 wrote to memory of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 PID 2924 wrote to memory of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 PID 2924 wrote to memory of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 PID 2924 wrote to memory of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 PID 2924 wrote to memory of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 PID 2924 wrote to memory of 588 2924 7924b3ad929eff3bb829b98188e429cb.exe 30 PID 3036 wrote to memory of 920 3036 lotih.exe 32 PID 3036 wrote to memory of 920 3036 lotih.exe 32 PID 3036 wrote to memory of 920 3036 lotih.exe 32 PID 3036 wrote to memory of 920 3036 lotih.exe 32 PID 3036 wrote to memory of 920 3036 lotih.exe 32 PID 3036 wrote to memory of 1388 3036 lotih.exe 31 PID 3036 wrote to memory of 1388 3036 lotih.exe 31 PID 3036 wrote to memory of 1388 3036 lotih.exe 31 PID 3036 wrote to memory of 1388 3036 lotih.exe 31 PID 3036 wrote to memory of 1388 3036 lotih.exe 31 PID 3036 wrote to memory of 632 3036 lotih.exe 33 PID 3036 wrote to memory of 632 3036 lotih.exe 33 PID 3036 wrote to memory of 632 3036 lotih.exe 33 PID 3036 wrote to memory of 632 3036 lotih.exe 33 PID 3036 wrote to memory of 632 3036 lotih.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7924b3ad929eff3bb829b98188e429cb.exe"C:\Users\Admin\AppData\Local\Temp\7924b3ad929eff3bb829b98188e429cb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Roaming\Muuwu\lotih.exe"C:\Users\Admin\AppData\Roaming\Muuwu\lotih.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp48a69729.bat"2⤵PID:588
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2196
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1684
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1490771202-141092954519031994467263384751430998931-2053965036-1987747461447986233"1⤵PID:1388
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:920
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
34KB
MD526c61e2bef127290f48da8d12cb5e442
SHA1b8aa48fb5a85091e782c0b6d0d2155f541c2385d
SHA256ad84525afc9cafad72fa27f526d0b0bc6b0a99f868b124baae770a293f93d717
SHA512462e21c0d2afc0297f712fb47ccd8ce21ff688db0d77430e60a138a8d1bc3d213a1e0961930805d27161573739d49503b689399cdd5b64c2292038523ceba7d6
-
Filesize
175KB
MD5903a51699d7d5f9d692620463edd6546
SHA169bc65283d6043106cf9462db733096882c1a8e6
SHA25660bf4ec7d6ba0bd5c239659c420c0822c3f4b751de030defdd7c2dfc27e7a22e
SHA5121e0629b27fadfd8aee80c264083feb72a23af4b199161a148c43de5093196529cbf968bd2243393fcac81fc8b7c1fe864394bdd34a9fd5d7b0aab2462cba089f
-
Filesize
366B
MD525364dd37d7f3b82b784312c0b4ca091
SHA1788c477bd75ff7cb1cd3dbed4f2e5e7536761a59
SHA2560750c18f6ebe5a3d0efcb0208a8f2dc2fb462cc2cf9a50f3aa7ee018f9f70cad
SHA512b357685fa0f542520a8a2a01e3fcb53ae79d853c29a6cb81970d4c53e37cfb0346959855213cd5fc55cb37af81cf50c2d09abc362fdb750b4a704196dcf0d19b