Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
cd2281116d8ca61ab7cb1e301b5b580e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd2281116d8ca61ab7cb1e301b5b580e.exe
Resource
win10v2004-20240226-en
General
-
Target
cd2281116d8ca61ab7cb1e301b5b580e.exe
-
Size
16KB
-
MD5
cd2281116d8ca61ab7cb1e301b5b580e
-
SHA1
1dbe84cbb499dac29d619b7e4b283515cb0900a6
-
SHA256
9a5139eeb50a93ae805809b587df06f59aed80002fa74a17ff427320fbd2f2e3
-
SHA512
e87d79648cd92e9adbc3bbd14ddf51c1b3cac9b82567477ff787ebdd3c60a7bd8a95d425cd6c1c400bf2af74f26670bd099543bfcc8f4fa07fa5aba759e3e0d0
-
SSDEEP
192:f8B1Mhzv1Z8F274/JQtCBdH0dHRdHwdHPH1SdHK18G+j5P:fQ1Yv1Z8jxQtCBqrmuw+B
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cd2281116d8ca61ab7cb1e301b5b580e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\PrinterSecurityLayer = "C:\\Windows\\LSPRN.EXE" cd2281116d8ca61ab7cb1e301b5b580e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run LSPRN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\PrinterSecurityLayer = "C:\\Windows\\LSPRN.EXE" LSPRN.EXE -
Sets file execution options in registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "0" cd2281116d8ca61ab7cb1e301b5b580e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe cd2281116d8ca61ab7cb1e301b5b580e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "0" cd2281116d8ca61ab7cb1e301b5b580e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe LSPRN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "0" LSPRN.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe LSPRN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "0" LSPRN.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe cd2281116d8ca61ab7cb1e301b5b580e.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 LSPRN.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Printer Driver = "C:\\Windows\\system32\\PRINTDRV.EXE" cd2281116d8ca61ab7cb1e301b5b580e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Printer Driver = "C:\\Windows\\system32\\PRINTDRV.EXE" LSPRN.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\LSPRN.EXE cd2281116d8ca61ab7cb1e301b5b580e.exe File opened for modification C:\Windows\LSPRN.EXE cd2281116d8ca61ab7cb1e301b5b580e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Security\DisableSecuritySettingsCheck = "1" cd2281116d8ca61ab7cb1e301b5b580e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\ cd2281116d8ca61ab7cb1e301b5b580e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" cd2281116d8ca61ab7cb1e301b5b580e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Security\DisableSecuritySettingsCheck = "1" LSPRN.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\ LSPRN.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" LSPRN.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2700 2236 cd2281116d8ca61ab7cb1e301b5b580e.exe 28 PID 2236 wrote to memory of 2700 2236 cd2281116d8ca61ab7cb1e301b5b580e.exe 28 PID 2236 wrote to memory of 2700 2236 cd2281116d8ca61ab7cb1e301b5b580e.exe 28 PID 2236 wrote to memory of 2700 2236 cd2281116d8ca61ab7cb1e301b5b580e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd2281116d8ca61ab7cb1e301b5b580e.exe"C:\Users\Admin\AppData\Local\Temp\cd2281116d8ca61ab7cb1e301b5b580e.exe"1⤵
- Adds policy Run key to start application
- Sets file execution options in registry
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\LSPRN.EXE"C:\Windows\LSPRN.EXE"2⤵
- Adds policy Run key to start application
- Sets file execution options in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5cd2281116d8ca61ab7cb1e301b5b580e
SHA11dbe84cbb499dac29d619b7e4b283515cb0900a6
SHA2569a5139eeb50a93ae805809b587df06f59aed80002fa74a17ff427320fbd2f2e3
SHA512e87d79648cd92e9adbc3bbd14ddf51c1b3cac9b82567477ff787ebdd3c60a7bd8a95d425cd6c1c400bf2af74f26670bd099543bfcc8f4fa07fa5aba759e3e0d0