Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
4ce2b845af3bb367883aeebd12f577d1143a9d106402d50dd257ad5bcdc7405f.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4ce2b845af3bb367883aeebd12f577d1143a9d106402d50dd257ad5bcdc7405f.exe
Resource
win10v2004-20240419-en
General
-
Target
4ce2b845af3bb367883aeebd12f577d1143a9d106402d50dd257ad5bcdc7405f.exe
-
Size
396KB
-
MD5
1f491b47bb66d0d59a8a84204907df6f
-
SHA1
a2ee087f969a1753d5bd32a512be15f90471304b
-
SHA256
4ce2b845af3bb367883aeebd12f577d1143a9d106402d50dd257ad5bcdc7405f
-
SHA512
09a15262f9429667e0f8ce2b22af2f6146b2f973522649953c4d93d87f12780991b222d3d6ac2137b41710e227783d90ef623faa7ae6d4584e09503e8c5bb3e5
-
SSDEEP
6144:4jlYKRF/LReWAsUyjzSWVADHX3ooPFVHO2LVAWWuZz3:4jauDReWhKDHX3ooPFA2LVAQ3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1408 lhprp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\lhprp.exe" lhprp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1408 1968 4ce2b845af3bb367883aeebd12f577d1143a9d106402d50dd257ad5bcdc7405f.exe 83 PID 1968 wrote to memory of 1408 1968 4ce2b845af3bb367883aeebd12f577d1143a9d106402d50dd257ad5bcdc7405f.exe 83 PID 1968 wrote to memory of 1408 1968 4ce2b845af3bb367883aeebd12f577d1143a9d106402d50dd257ad5bcdc7405f.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ce2b845af3bb367883aeebd12f577d1143a9d106402d50dd257ad5bcdc7405f.exe"C:\Users\Admin\AppData\Local\Temp\4ce2b845af3bb367883aeebd12f577d1143a9d106402d50dd257ad5bcdc7405f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\ProgramData\lhprp.exe"C:\ProgramData\lhprp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5678c17ab3685438f381e6afaf14aa36b
SHA1905717e18369518582095dc8403a965df9c479e1
SHA25689bdb85e8b1038c96893386a5e6d94f7eac4d675121324ce3e64b0c412ebca47
SHA5129fcd0d5d82b305c90839b735dd6e32dbc048ba1f6cd2a1c183221ecf6693189efcab6f18d23756dbcb77d0169c814cdcc033a7d1475e5d8e76279603caaab697
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
259KB
MD5b3e0e5440de04ebead041c7c67aae138
SHA1ed32ff7037dabf9f9b34f98f42fe4da72d0b3a96
SHA256aba1ac18d916aff657b3a543b4ca856cdfb92e524a87390b22d86afbeec4ce7d
SHA51219c200c89d25e177a9d507596c69bae5ef8f4a7b1447ae8f813457f531cecc104a559acd4ee835f9977b83ab5f305c0ff3f17a96168b1617d9e54a2064c7abd4