Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10VirusSign....f3.exe
windows7-x64
10VirusSign....f3.exe
windows10-2004-x64
10VirusSign....ff.exe
windows7-x64
7VirusSign....ff.exe
windows10-2004-x64
7VirusSign....2d.exe
windows7-x64
1VirusSign....2d.exe
windows10-2004-x64
1VirusSign....31.exe
windows7-x64
VirusSign....31.exe
windows10-2004-x64
VirusSign....67.exe
windows7-x64
1VirusSign....67.exe
windows10-2004-x64
10VirusSign....f9.exe
windows7-x64
10VirusSign....f9.exe
windows10-2004-x64
10VirusSign....76.exe
windows7-x64
10VirusSign....76.exe
windows10-2004-x64
10VirusSign....45.exe
windows7-x64
1VirusSign....45.exe
windows10-2004-x64
1VirusSign....3a.exe
windows7-x64
10VirusSign....3a.exe
windows10-2004-x64
10VirusSign....2b.exe
windows7-x64
7VirusSign....2b.exe
windows10-2004-x64
7VirusSign....74.exe
windows7-x64
1VirusSign....74.exe
windows10-2004-x64
1VirusSign....9e.exe
windows7-x64
7VirusSign....9e.exe
windows10-2004-x64
7VirusSign....22.exe
windows7-x64
7VirusSign....22.exe
windows10-2004-x64
7VirusSign....ef.exe
windows7-x64
7VirusSign....ef.exe
windows10-2004-x64
7VirusSign....f3.exe
windows7-x64
3VirusSign....f3.exe
windows10-2004-x64
3VirusSign....d8.exe
windows7-x64
1VirusSign....d8.exe
windows10-2004-x64
7Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
VirusSign.2024.02.08/036062de97522e2c40b04d1c1c0d5bf3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusSign.2024.02.08/036062de97522e2c40b04d1c1c0d5bf3.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral3
Sample
VirusSign.2024.02.08/0366d8bc8e9bd5e64e301190356e79ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
VirusSign.2024.02.08/0366d8bc8e9bd5e64e301190356e79ff.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral5
Sample
VirusSign.2024.02.08/0372bdc19184e4dd7461170dfb052a2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
VirusSign.2024.02.08/0372bdc19184e4dd7461170dfb052a2d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
VirusSign.2024.02.08/038db7a1bc9f32408eb32a8b02b5cf31.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
VirusSign.2024.02.08/038db7a1bc9f32408eb32a8b02b5cf31.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
VirusSign.2024.02.08/0399febb08bcbf43227bad19576af767.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
VirusSign.2024.02.08/0399febb08bcbf43227bad19576af767.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral11
Sample
VirusSign.2024.02.08/03a3a464ef2a1fbe54b35a8effbf54f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
VirusSign.2024.02.08/03a3a464ef2a1fbe54b35a8effbf54f9.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
VirusSign.2024.02.08/03a4ed0cb8c9721fc1369cc5f381fd76.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
VirusSign.2024.02.08/03a4ed0cb8c9721fc1369cc5f381fd76.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
VirusSign.2024.02.08/03af51abe00f3c6154bc829f07f83945.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
VirusSign.2024.02.08/03af51abe00f3c6154bc829f07f83945.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
VirusSign.2024.02.08/03b6a8e2d209f10cce366b73bec0283a.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
VirusSign.2024.02.08/03b6a8e2d209f10cce366b73bec0283a.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
VirusSign.2024.02.08/03ba9978296204d2048fb184e546932b.exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
VirusSign.2024.02.08/03ba9978296204d2048fb184e546932b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
VirusSign.2024.02.08/03e3a2fc4bf137d68962d35b23186a74.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
VirusSign.2024.02.08/03e3a2fc4bf137d68962d35b23186a74.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
VirusSign.2024.02.08/03e8dd811ff56c2ef65a494a29601f9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
VirusSign.2024.02.08/03e8dd811ff56c2ef65a494a29601f9e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
VirusSign.2024.02.08/03eec9b444ff21a20e84fa8592478c22.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
VirusSign.2024.02.08/03eec9b444ff21a20e84fa8592478c22.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
VirusSign.2024.02.08/04048340f3e175baa6bd71fcc12851ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
VirusSign.2024.02.08/04048340f3e175baa6bd71fcc12851ef.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral29
Sample
VirusSign.2024.02.08/0409c5c4922e4b79e2017df62f632cf3.exe
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
VirusSign.2024.02.08/0409c5c4922e4b79e2017df62f632cf3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
VirusSign.2024.02.08/040dcef90aa17a406b8de190fd3330d8.exe
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
VirusSign.2024.02.08/040dcef90aa17a406b8de190fd3330d8.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusSign.2024.02.08/03a4ed0cb8c9721fc1369cc5f381fd76.exe
-
Size
141KB
-
MD5
03a4ed0cb8c9721fc1369cc5f381fd76
-
SHA1
2ecac749fe4791a39876458be83c7101b5513e71
-
SHA256
b60ae197bb4109e48286207da2ab9eaa1642d37dda797ac6aabbe8c4dc10ae88
-
SHA512
f495bfafce3c029fd01f55272e101f84f7e6c5be579dbca0b69dad1731ead82db10de661a9dac043bc1de2f853086644d042b6ceb6f4aa00cc5581c7ae77d832
-
SSDEEP
3072:aSqxOrrOWl+oWxkFPwQ9bGCmBJFWpoPSkGFj/p7sW0l:aOaWFPN9bGCKJFtE/JK
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkjpggkn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kipmhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldgnklmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldgnklmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 03a4ed0cb8c9721fc1369cc5f381fd76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 03a4ed0cb8c9721fc1369cc5f381fd76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kipmhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Libjncnc.exe -
Executes dropped EXE 5 IoCs
pid Process 2692 Kkjpggkn.exe 2668 Kipmhc32.exe 1208 Libjncnc.exe 2612 Ldgnklmi.exe 2620 Lbjofi32.exe -
Loads dropped DLL 14 IoCs
pid Process 2296 03a4ed0cb8c9721fc1369cc5f381fd76.exe 2296 03a4ed0cb8c9721fc1369cc5f381fd76.exe 2692 Kkjpggkn.exe 2692 Kkjpggkn.exe 2668 Kipmhc32.exe 2668 Kipmhc32.exe 1208 Libjncnc.exe 1208 Libjncnc.exe 2612 Ldgnklmi.exe 2612 Ldgnklmi.exe 2392 WerFault.exe 2392 WerFault.exe 2392 WerFault.exe 2392 WerFault.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kkjpggkn.exe 03a4ed0cb8c9721fc1369cc5f381fd76.exe File created C:\Windows\SysWOW64\Hlekjpbi.dll 03a4ed0cb8c9721fc1369cc5f381fd76.exe File created C:\Windows\SysWOW64\Lbjofi32.exe Ldgnklmi.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Ldgnklmi.exe File created C:\Windows\SysWOW64\Ldgnklmi.exe Libjncnc.exe File opened for modification C:\Windows\SysWOW64\Kkjpggkn.exe 03a4ed0cb8c9721fc1369cc5f381fd76.exe File created C:\Windows\SysWOW64\Dkpnde32.dll Kkjpggkn.exe File created C:\Windows\SysWOW64\Cbamip32.dll Libjncnc.exe File created C:\Windows\SysWOW64\Kipmhc32.exe Kkjpggkn.exe File opened for modification C:\Windows\SysWOW64\Kipmhc32.exe Kkjpggkn.exe File created C:\Windows\SysWOW64\Libjncnc.exe Kipmhc32.exe File opened for modification C:\Windows\SysWOW64\Libjncnc.exe Kipmhc32.exe File created C:\Windows\SysWOW64\Ipbkjl32.dll Kipmhc32.exe File opened for modification C:\Windows\SysWOW64\Ldgnklmi.exe Libjncnc.exe File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe Ldgnklmi.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2392 2620 WerFault.exe 31 -
Modifies registry class 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 03a4ed0cb8c9721fc1369cc5f381fd76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkjpggkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Ldgnklmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlekjpbi.dll" 03a4ed0cb8c9721fc1369cc5f381fd76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkpnde32.dll" Kkjpggkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kipmhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipbkjl32.dll" Kipmhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kipmhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbamip32.dll" Libjncnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 03a4ed0cb8c9721fc1369cc5f381fd76.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 03a4ed0cb8c9721fc1369cc5f381fd76.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 03a4ed0cb8c9721fc1369cc5f381fd76.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Libjncnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldgnklmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldgnklmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 03a4ed0cb8c9721fc1369cc5f381fd76.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2692 2296 03a4ed0cb8c9721fc1369cc5f381fd76.exe 29 PID 2296 wrote to memory of 2692 2296 03a4ed0cb8c9721fc1369cc5f381fd76.exe 29 PID 2296 wrote to memory of 2692 2296 03a4ed0cb8c9721fc1369cc5f381fd76.exe 29 PID 2296 wrote to memory of 2692 2296 03a4ed0cb8c9721fc1369cc5f381fd76.exe 29 PID 2692 wrote to memory of 2668 2692 Kkjpggkn.exe 30 PID 2692 wrote to memory of 2668 2692 Kkjpggkn.exe 30 PID 2692 wrote to memory of 2668 2692 Kkjpggkn.exe 30 PID 2692 wrote to memory of 2668 2692 Kkjpggkn.exe 30 PID 2668 wrote to memory of 1208 2668 Kipmhc32.exe 34 PID 2668 wrote to memory of 1208 2668 Kipmhc32.exe 34 PID 2668 wrote to memory of 1208 2668 Kipmhc32.exe 34 PID 2668 wrote to memory of 1208 2668 Kipmhc32.exe 34 PID 1208 wrote to memory of 2612 1208 Libjncnc.exe 33 PID 1208 wrote to memory of 2612 1208 Libjncnc.exe 33 PID 1208 wrote to memory of 2612 1208 Libjncnc.exe 33 PID 1208 wrote to memory of 2612 1208 Libjncnc.exe 33 PID 2612 wrote to memory of 2620 2612 Ldgnklmi.exe 31 PID 2612 wrote to memory of 2620 2612 Ldgnklmi.exe 31 PID 2612 wrote to memory of 2620 2612 Ldgnklmi.exe 31 PID 2612 wrote to memory of 2620 2612 Ldgnklmi.exe 31 PID 2620 wrote to memory of 2392 2620 Lbjofi32.exe 32 PID 2620 wrote to memory of 2392 2620 Lbjofi32.exe 32 PID 2620 wrote to memory of 2392 2620 Lbjofi32.exe 32 PID 2620 wrote to memory of 2392 2620 Lbjofi32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusSign.2024.02.08\03a4ed0cb8c9721fc1369cc5f381fd76.exe"C:\Users\Admin\AppData\Local\Temp\VirusSign.2024.02.08\03a4ed0cb8c9721fc1369cc5f381fd76.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Kkjpggkn.exeC:\Windows\system32\Kkjpggkn.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\Kipmhc32.exeC:\Windows\system32\Kipmhc32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Libjncnc.exeC:\Windows\system32\Libjncnc.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1208
-
-
-
-
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 1402⤵
- Loads dropped DLL
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\Ldgnklmi.exeC:\Windows\system32\Ldgnklmi.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5fdacbd1fd9b8f351dd1019720d793cc6
SHA13c127a159c6b16ae06539ff4b798394585c2106c
SHA2568ec413702c2f5ff6874dc1e143669c52a388b871cfeebb4212933ce15c24dd04
SHA512552f6d3eaf1310e21b8e0ebaa545bbb6dc7891919df43aee4dbd993df83db05067d306b2da65da2b0e344fe287a18009ef415aa4023df9f016b8124208d87433
-
Filesize
141KB
MD598066d84c94b9033ff7224b18545ec48
SHA16204fcedfc66fb0ba4c44476da00a0b10c3d7efd
SHA256121102a93cb14985c39d4f7e170cbc889ccb35c5a81c7ec878a0bd12309be672
SHA5121d8152947aae1bb92d1662c533d168483fe276906f08e94384198e92074c6ab534230733bc95bd75838e4898d8ee38da689749b8e60467cdae8dff3865a0ecbd
-
Filesize
141KB
MD5e3567f8f9ced82463db15aa2dd63e9f5
SHA1a2158f9d34971f223af86ba25f68b74a8a7eb416
SHA2564a4be41b4fdaf3fe867b2c56135107893436be1e368ca91a2a314cde1eccaa4d
SHA512349d8b5ad8c69dd3490fdcb6f12cee03747319f84e644f58d8d88760544344ac2aa2c65a8177c97f4df7954e32a8bc31e61447f8838f470c1328c105ffaa3563
-
Filesize
141KB
MD58df79baf31f097b08cb9aedd6c550f29
SHA10c2426c4eec8eb7e1d41b118d2c42c5d5a8df59d
SHA2565a521a4b717d39572f932a8fab78ba892815b7abe2580673bf86bc33103e8aa0
SHA512fd0362dada2f4e331801ace539a4f29d3af32ff9144ed1444fb850b4953dd3461fb77b035aa0e2a90ea361dbb2728d2b23f39fffec7507eba382cc358ad55984
-
Filesize
141KB
MD52b252960aa382f56e90d1ae71a1d9aed
SHA195efe62608033e6402a382a17ff7e6ae25d8d964
SHA25671c611692d2b4c940cbe6ac6a9298848378e3f87c55cdd429e10a0a7e080daea
SHA5127d7d609c57dc418ae174192b7b320580ca5c281f8b48a1f9d7d48f940123ba85095fd53a8cace93bc81b369631d045b6b0697c5f681ae8ba5d20fb57afc130ad