Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
571s -
max time network
725s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
23/02/2024, 14:44
Behavioral task
behavioral1
Sample
lol.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
lol.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
lol.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral4
Sample
lol.exe
Resource
win11-20240221-en
General
-
Target
lol.exe
-
Size
214KB
-
MD5
bd367e4170e17df14b5a6a15cdfd79b0
-
SHA1
206cb6b1336d890e2bb8f4f36cf27b9d78ca8b1a
-
SHA256
1b0fb3b5cd0ff954ab04c5502d0be2270181da75cca92f84ab91e4142745ed56
-
SHA512
c62163ea1be9652862112116200ca0153737b7af6b1439b820687c4bbaf52fb616c70bbd3ca55dfe3d24a178a99d831ef6819e685de5e838473b26ea6281b5f6
-
SSDEEP
6144:DXP9zPvM92B+64kQ2EJam2dNREz9FdOZMJwGuE4QyZom8exsrPR5TE7D0XuDTTo6:DX5s2B+64kQHam2dNREz9FdOZMJwGuEu
Malware Config
Signatures
-
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe lol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe lol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.url lol.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\lol.exe\" .." lol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\lol.exe\" .." lol.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 0.tcp.eu.ngrok.io 18 0.tcp.eu.ngrok.io -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Kills process with taskkill 2 IoCs
pid Process 316 TASKKILL.exe 168 TASKKILL.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe 2332 lol.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2332 lol.exe Token: SeDebugPrivilege 168 TASKKILL.exe Token: SeDebugPrivilege 316 TASKKILL.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: SeDebugPrivilege 1540 taskmgr.exe Token: SeSystemProfilePrivilege 1540 taskmgr.exe Token: SeCreateGlobalPrivilege 1540 taskmgr.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: SeDebugPrivilege 4248 taskmgr.exe Token: SeSystemProfilePrivilege 4248 taskmgr.exe Token: SeCreateGlobalPrivilege 4248 taskmgr.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe Token: SeIncBasePriorityPrivilege 2332 lol.exe Token: 33 2332 lol.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 1540 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe 4248 taskmgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2332 wrote to memory of 316 2332 lol.exe 74 PID 2332 wrote to memory of 316 2332 lol.exe 74 PID 2332 wrote to memory of 316 2332 lol.exe 74 PID 2332 wrote to memory of 168 2332 lol.exe 77 PID 2332 wrote to memory of 168 2332 lol.exe 77 PID 2332 wrote to memory of 168 2332 lol.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\lol.exe"C:\Users\Admin\AppData\Local\Temp\lol.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:168
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:4632
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1540
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4248
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD50d02b03a068d671348931cc20c048422
SHA167b6deacf1303acfcbab0b158157fdc03a02c8d5
SHA25644f4263d65889ea8f0db3c6e31a956a4664e9200aba2612c9be7016feeb323c0
SHA512805e7b4fafed39dec5ecc2ede0c65b6e103e6757e0bd43ecdce7c00932f59e3e7a68d2ea0818244dfeb691b022c1ccca590a3f4239f99e1cd8a29ba66daed358
-
Filesize
2KB
MD5a2942665b12ed000cd2ac95adef8e0cc
SHA1ac194f8d30f659131d1c73af8d44e81eccab7fde
SHA256bdc5de6c42c523a333c26160d212c62385b03f5ebdae5aa8c5d025ff3f8aa374
SHA5124e5ba962ba97656974c390b45302d60f4c82d604feb6199d44e80497a40d0b0a9fd119ca17ac184809ca0821ab6813292892c433ed7277f65c275f37a96070b9