Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
29/06/2024, 17:44
240629-wbgxeavgnr 829/06/2024, 17:43
240629-wak8fascjg 329/06/2024, 17:38
240629-v73y3svgkl 729/06/2024, 17:37
240629-v68syavgjl 329/06/2024, 17:31
240629-v3wdfasard 729/06/2024, 14:11
240629-rhp45sygnh 729/06/2024, 14:08
240629-rf1svssbnk 3Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
Lemotu.rar
Resource
win10v2004-20240611-en
General
-
Target
Lemotu.rar
-
Size
19.2MB
-
MD5
46d888e464737207c89193ce92ee4014
-
SHA1
b8dbd0ad6d33f69570609e459bdc646d86fc177a
-
SHA256
03cdb29b6e0b1da7038eb0a999f344f797a4d547548dbdb1b565771df30d2b8b
-
SHA512
1de74a63b4cc8e3d978a28215ac8cfa651d2a0212ed92ece6840d3a05a5567f664ca631ee3c00ac4f9a6e828cdc4cea69ce5e6fee97facb17c15f36e01c6691b
-
SSDEEP
393216:vaZW3Tk17K0YCuMk4zuKluG99o49fAqsW8HE1xFCkpnzAWJAlG:yZ7huMk4qERA4xHsW8WrC6n0WClG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2228 OpenWith.exe 2228 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 2228 7zFM.exe Token: 35 2228 7zFM.exe Token: SeSecurityPrivilege 2228 7zFM.exe Token: SeSecurityPrivilege 2228 7zFM.exe Token: SeSecurityPrivilege 2228 7zFM.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2228 7zFM.exe 2228 7zFM.exe 2228 7zFM.exe 2228 7zFM.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Lemotu.rar1⤵
- Modifies registry class
PID:332
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2228
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3196
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Lemotu.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2228