Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 07:31

General

  • Target

    lianlianksetup.exe

  • Size

    2.3MB

  • MD5

    8e0210e9d82b6cdd6cdad525635840f8

  • SHA1

    0ca4aaea97f795a14106d43db31620880b5e51fc

  • SHA256

    728a8b53b8f274493d014a6512d4dd0ac5af0e3975f40dde6b987ee702a7ad31

  • SHA512

    1817974bde32fcf66ef61784abc189764550e8957c4bd8ad86a9c69aaacba511a9c7ad1a717fb712911a4496742af80f6f9990a28e5ffb29c16b2fd58631538a

  • SSDEEP

    49152:wGpOJUIO+eZK21k+FGa0tN8+xGuTt9Q0ScEVksNS+dZG7Syz1fZLWVoj8kQbEBoJ:NpXL+eZK2L6N8+n80Scog+z6h1xLFwE6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lianlianksetup.exe
    "C:\Users\Admin\AppData\Local\Temp\lianlianksetup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\is-CMKH9.tmp\is-EQ0RL.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-CMKH9.tmp\is-EQ0RL.tmp" /SL4 $4001C "C:\Users\Admin\AppData\Local\Temp\lianlianksetup.exe" 2053939 59904
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-CMKH9.tmp\is-EQ0RL.tmp

    Filesize

    650KB

    MD5

    db0a4600cdff0e42a86c302cd2965a09

    SHA1

    5c7bdaca4886981bf7a58113567867d47a7340a9

    SHA256

    92119b6be7ab36d79ddd34fe9d9487e7c709405805611a7ea09c0dd604663513

    SHA512

    e9c0cd823c76086b42f530b2533163b1608fda17ee86565301d78c18a12e0ffcc7fb717bc989918f2c27b9dc985b534c9df9a8bd2f6b45941e3caf4652a08832

  • \Users\Admin\AppData\Local\Temp\is-R58SU.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/848-17-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2380-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2380-2-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/2380-16-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB