Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/02/2024, 03:28

240213-d1bskshe72 7

13/02/2024, 03:26

240213-dzfp5shd54 7

Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 03:26

General

  • Target

    Lucifer/cnc/database.go

  • Size

    14KB

  • MD5

    3f56cd14a6e48d17d7ad63c17fb1045c

  • SHA1

    3f41a9d97f74cc95b727a28e8315d94fa508191e

  • SHA256

    4e1ac9551a19051f1e38a6ea96950200db8816c31dba37804bb25d97294ee40a

  • SHA512

    49c9baf0a682566acc658951a492761c24469985a0db2ead4be4a2dc77d36872c6b1ab2227ec12431335f562a7ee48bc0f5932e1b2da53ae26d6020c706970cc

  • SSDEEP

    192:tlR04lRMMzVoBylDNZXm+b5l5HyG8Jc0sUc666kRHQtU1B65aMn6LCUPYKb8Ypbj:tJrnbQOlgGesiHMsUu596LLPB8atR

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Lucifer\cnc\database.go
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lucifer\cnc\database.go
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lucifer\cnc\database.go"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0e2959d8106ad9097c511e0b94119964

    SHA1

    c386296d8a7c79910d835c11536373eeeb17ce9d

    SHA256

    94868a8a5710cfa65a97e73237736ab3a6135a08b96d3ddf86c6f2b56ba77bb8

    SHA512

    a6c79e65c664a87aaf77f95636a32f20bc560614df4ce5076b973c9f3cfde3bc3817481e20b305d83fae76feaa3b34d0bef802cc579313cccadbf524afff32df