Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
be0a74d371455797d1c7c979bd4130ae.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
be0a74d371455797d1c7c979bd4130ae.exe
Resource
win10v2004-20240226-en
General
-
Target
be0a74d371455797d1c7c979bd4130ae.exe
-
Size
184KB
-
MD5
be0a74d371455797d1c7c979bd4130ae
-
SHA1
3184fc339a644d1e85ba578f90c246ec46e45b81
-
SHA256
44e7c4e30d8a658d65d823c90f7b2093d5c420b7a1bebc4fd2fdd80ee58a0cc8
-
SHA512
9c8fa4c3ce8edce3de1201f54e3c1fedf78ff5f00c994e462862510a93b8b87fb79f4e8c4513fb20d54f6dbbd1021b53c911ffad144783446e5a222c3a3f14e2
-
SSDEEP
3072:sKjcLo2sck6HR1kT+SCBT2KD07wcJ1USgyavhmVizMpbzyv8+CT:sNRsckgH++SCNv2wcJ1USgya5Y6MpbVZ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" be0a74d371455797d1c7c979bd4130ae.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lrjan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation be0a74d371455797d1c7c979bd4130ae.exe -
Executes dropped EXE 1 IoCs
pid Process 5088 lrjan.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /l" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /b" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /x" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /w" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /h" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /e" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /t" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /y" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /f" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /a" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /o" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /z" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /g" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /r" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /k" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /j" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /q" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /c" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /v" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /s" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /i" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /a" be0a74d371455797d1c7c979bd4130ae.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /d" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /u" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /m" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /n" lrjan.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrjan = "C:\\Users\\Admin\\lrjan.exe /p" lrjan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2956 be0a74d371455797d1c7c979bd4130ae.exe 2956 be0a74d371455797d1c7c979bd4130ae.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe 5088 lrjan.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2956 be0a74d371455797d1c7c979bd4130ae.exe 5088 lrjan.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2956 wrote to memory of 5088 2956 be0a74d371455797d1c7c979bd4130ae.exe 97 PID 2956 wrote to memory of 5088 2956 be0a74d371455797d1c7c979bd4130ae.exe 97 PID 2956 wrote to memory of 5088 2956 be0a74d371455797d1c7c979bd4130ae.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\be0a74d371455797d1c7c979bd4130ae.exe"C:\Users\Admin\AppData\Local\Temp\be0a74d371455797d1c7c979bd4130ae.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\lrjan.exe"C:\Users\Admin\lrjan.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD58cda71ea0dba64d3fc9ef83a6f472cb5
SHA1a6310b317a1a3e6fae7738342e8f10be01613daa
SHA256c8ee4a747f30c3d5d87a815804106c551bc137c7f4a9434fc15756af05f681ab
SHA5124f47cd87b5ba64f0bcee94de0f0ec7a83230e6763b6a389622fafdd43a59a0be521ae3b75c85a344733f11e4275180731d1396498e2e874553efd499c4f9358c