Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 19:28

General

  • Target

    20936d2ecded668d90e9097e325e71b4e0eaa0d71f56269a0560a05aff4242b1.exe

  • Size

    92KB

  • MD5

    00c3fe0bdda5fbd589a2e615656a9b98

  • SHA1

    fe8330cb84becea449574ad25df50283fee15956

  • SHA256

    20936d2ecded668d90e9097e325e71b4e0eaa0d71f56269a0560a05aff4242b1

  • SHA512

    afe3ea5a32ed47b5905dfada72823aad50a2b7fa04593f7373425d271050f21ac96d56366d4f283e3eae80af3eb486813085109e46497a5ecce7c8de6e6da873

  • SSDEEP

    1536:NkxBKTbKsZLyJxFdhXgI0TRQP/FY0Y6Y2YkYGYHRHNxtwv4RaoacXcmKd9Qa:cKTbDpCH6QP/uRNBcbd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20936d2ecded668d90e9097e325e71b4e0eaa0d71f56269a0560a05aff4242b1.exe
    "C:\Users\Admin\AppData\Local\Temp\20936d2ecded668d90e9097e325e71b4e0eaa0d71f56269a0560a05aff4242b1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Users\Admin\luohoil.exe
      "C:\Users\Admin\luohoil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\luohoil.exe

    Filesize

    92KB

    MD5

    727c32dd1f0b3882b369410c7e257072

    SHA1

    7d1d42cc8b108cbc3316e56b0c30e50cb1641358

    SHA256

    9842fbe9cccbc76b5148b4520272b9481e5c2a8ad6bca98f1d07176dc00fbb38

    SHA512

    243aaf846041dc236dfbd658bca260b9c750e8236b82e6c55fd93cffa04c42ff70b2c64b1d11e6f49866d1a0e05a60d732e834909f33bceba31e6ded638f5d99