Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
acf068bafccdcbfb89a0f204b69cfe64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acf068bafccdcbfb89a0f204b69cfe64.exe
Resource
win10v2004-20240226-en
General
-
Target
acf068bafccdcbfb89a0f204b69cfe64.exe
-
Size
66KB
-
MD5
acf068bafccdcbfb89a0f204b69cfe64
-
SHA1
521d2c612ce20ef39367d34391ce8335eafadf5c
-
SHA256
0d923f57089f82baaf9b8aa2fdebc0f906337be3c41ab0cd78553aee51cd77fd
-
SHA512
2a57197c166f6e88912ed2f9e3abe63de221c7336375fe9b88e000479475481049ba24e006fe80eb2ecc06f7b30666b36434681d9f0a4a4f392d8831e9d01931
-
SSDEEP
1536:d9yppfstVIqE5N9HW6BPUyQdh6JIBchD7VqhSkwGn/Ir0S:ny7vqkWAPUyQd2d7R1L
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1200 helperlcsass.exe -
Executes dropped EXE 3 IoCs
pid Process 1200 helperlcsass.exe 2640 lcsass.exe 2408 helperlcsass.exe -
Loads dropped DLL 6 IoCs
pid Process 2156 acf068bafccdcbfb89a0f204b69cfe64.exe 2156 acf068bafccdcbfb89a0f204b69cfe64.exe 1200 helperlcsass.exe 1200 helperlcsass.exe 2640 lcsass.exe 2640 lcsass.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dsgb = "C:\\Windows\\SysWOW64\\lcsass.exe" lcsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\dsgb = "C:\\Windows\\SysWOW64\\lcsass.exe" lcsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dsgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\acf068bafccdcbfb89a0f204b69cfe64.exe" acf068bafccdcbfb89a0f204b69cfe64.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\dsgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\acf068bafccdcbfb89a0f204b69cfe64.exe" acf068bafccdcbfb89a0f204b69cfe64.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\helperlcsass.exe lcsass.exe File opened for modification C:\Windows\SysWOW64\lcsass.exe helperlcsass.exe File opened for modification C:\Windows\SysWOW64\helperlcsass.exe acf068bafccdcbfb89a0f204b69cfe64.exe File created C:\Windows\SysWOW64\helperlcsass.exe acf068bafccdcbfb89a0f204b69cfe64.exe File created C:\Windows\SysWOW64\lcsass.exe helperlcsass.exe File opened for modification C:\Windows\SysWOW64\lcsass.exe helperlcsass.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1200 2156 acf068bafccdcbfb89a0f204b69cfe64.exe 28 PID 2156 wrote to memory of 1200 2156 acf068bafccdcbfb89a0f204b69cfe64.exe 28 PID 2156 wrote to memory of 1200 2156 acf068bafccdcbfb89a0f204b69cfe64.exe 28 PID 2156 wrote to memory of 1200 2156 acf068bafccdcbfb89a0f204b69cfe64.exe 28 PID 1200 wrote to memory of 2640 1200 helperlcsass.exe 29 PID 1200 wrote to memory of 2640 1200 helperlcsass.exe 29 PID 1200 wrote to memory of 2640 1200 helperlcsass.exe 29 PID 1200 wrote to memory of 2640 1200 helperlcsass.exe 29 PID 2640 wrote to memory of 2408 2640 lcsass.exe 30 PID 2640 wrote to memory of 2408 2640 lcsass.exe 30 PID 2640 wrote to memory of 2408 2640 lcsass.exe 30 PID 2640 wrote to memory of 2408 2640 lcsass.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\acf068bafccdcbfb89a0f204b69cfe64.exe"C:\Users\Admin\AppData\Local\Temp\acf068bafccdcbfb89a0f204b69cfe64.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\helperlcsass.exeC:\Users\Admin\AppData\Local\Temp\acf068bafccdcbfb89a0f204b69cfe64.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\lcsass.exeC:\Windows\system32\lcsass.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\helperlcsass.exeC:\Windows\SysWOW64\lcsass.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e648bac4f1ea6e8dbf92cbf7f4857eee
SHA197c294a94f8efc22b7fd57b0813a64c8548426f0
SHA2560424a7c2c74405105ebfa622bc3cb46b3083612910f5309537d2a2df3e284c7d
SHA512e128077982ef473db97d4227713adc9debb195a1a00bfbcce6492db5967b5077e9b3296b3be666cb82dd15214dc7432a82ff6ef82700c5b20c0bf2252c5d7156
-
Filesize
66KB
MD5acf068bafccdcbfb89a0f204b69cfe64
SHA1521d2c612ce20ef39367d34391ce8335eafadf5c
SHA2560d923f57089f82baaf9b8aa2fdebc0f906337be3c41ab0cd78553aee51cd77fd
SHA5122a57197c166f6e88912ed2f9e3abe63de221c7336375fe9b88e000479475481049ba24e006fe80eb2ecc06f7b30666b36434681d9f0a4a4f392d8831e9d01931