Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 18:20
Behavioral task
behavioral1
Sample
help.chm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
help.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
lockfolder.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
lockfolder.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
新云软件.url
Resource
win10v2004-20240709-en
General
-
Target
lockfolder.exe
-
Size
943KB
-
MD5
6485f94e7623906927dbf2d80674d8fb
-
SHA1
766ee84733a14d0715799c954b42887ee3d02366
-
SHA256
4cf1567186a276ad04f7c63e2c726924f97b78314bcb28f6af810201ae182782
-
SHA512
c73d2ebdc3f164c6be568dfb3d2d4d5277b968dcf97a0570d2b91c31eb22b0fb0ca61e81333866a86fda2539a6d39d9291386e4ab2b7d40ab29c41443650746c
-
SSDEEP
24576:fxA3Z0z9d6/aqD1y62w0Wx/qkWYP4DpDzrrrpb/XKEqLBQI9mNl:fuZu9IpKoykWYP4DRwNQ4m
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2624 regsvr32.exe 2504 regsvr32.exe -
resource yara_rule behavioral3/memory/2140-0-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-45-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-49-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-43-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-41-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-39-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-37-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-35-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-33-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-31-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-29-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-27-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-25-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-23-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-21-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-19-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-17-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-15-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-13-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-11-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-9-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-7-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-5-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-4-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-3-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-64-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-65-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-66-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-69-0x00000000007A0000-0x00000000007DE000-memory.dmp upx behavioral3/memory/2140-70-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-71-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-72-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-73-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-74-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-75-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-76-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-77-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-78-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-79-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-80-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral3/memory/2140-81-0x0000000000400000-0x0000000000663000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{6C788253-1062-4DDE-BBAA-14C6C9C80B70} regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 lockfolder.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfile.sys lockfolder.exe File created C:\Windows\SysWOW64\FileHook.dll lockfolder.exe File opened for modification C:\Windows\SysWOW64\FileHook.dll lockfolder.exe File created C:\Windows\SysWOW64\FileBho.dll lockfolder.exe File opened for modification C:\Windows\SysWOW64\FileBho.dll lockfolder.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\lockfd.dll lockfolder.exe File created C:\Windows\lockfd.dll lockfolder.exe File opened for modification C:\Windows\systemlockfile008 lockfolder.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FileBho.FileBho regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C788253-1062-4DDE-BBAA-14C6C9C80B70}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FD11ABAA-6F3F-4C5C-90A3-AEDFB93A01CE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C788253-1062-4DDE-BBAA-14C6C9C80B70}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FileBho.FileBho\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FileBho.FileBho\Clsid\ = "{6C788253-1062-4DDE-BBAA-14C6C9C80B70}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FD11ABAA-6F3F-4C5C-90A3-AEDFB93A01CE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\folderCopyHook regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C788253-1062-4DDE-BBAA-14C6C9C80B70}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FileBho.FileBho\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C788253-1062-4DDE-BBAA-14C6C9C80B70}\ProgID\ = "FileBho.FileBho" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FD11ABAA-6F3F-4C5C-90A3-AEDFB93A01CE}\InprocServer32\ = "C:\\Windows\\SysWOW64\\FileHook.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FD11ABAA-6F3F-4C5C-90A3-AEDFB93A01CE}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\folderCopyHook\ = "{FD11ABAA-6F3F-4C5C-90A3-AEDFB93A01CE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C788253-1062-4DDE-BBAA-14C6C9C80B70} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C788253-1062-4DDE-BBAA-14C6C9C80B70}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C788253-1062-4DDE-BBAA-14C6C9C80B70}\InprocServer32\ = "C:\\Windows\\SysWOW64\\FileBho.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FD11ABAA-6F3F-4C5C-90A3-AEDFB93A01CE}\ = "folder CopyHook Shell Extension" regsvr32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2140 lockfolder.exe 2140 lockfolder.exe 2140 lockfolder.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2624 2140 lockfolder.exe 30 PID 2140 wrote to memory of 2624 2140 lockfolder.exe 30 PID 2140 wrote to memory of 2624 2140 lockfolder.exe 30 PID 2140 wrote to memory of 2624 2140 lockfolder.exe 30 PID 2140 wrote to memory of 2624 2140 lockfolder.exe 30 PID 2140 wrote to memory of 2624 2140 lockfolder.exe 30 PID 2140 wrote to memory of 2624 2140 lockfolder.exe 30 PID 2140 wrote to memory of 2504 2140 lockfolder.exe 31 PID 2140 wrote to memory of 2504 2140 lockfolder.exe 31 PID 2140 wrote to memory of 2504 2140 lockfolder.exe 31 PID 2140 wrote to memory of 2504 2140 lockfolder.exe 31 PID 2140 wrote to memory of 2504 2140 lockfolder.exe 31 PID 2140 wrote to memory of 2504 2140 lockfolder.exe 31 PID 2140 wrote to memory of 2504 2140 lockfolder.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\lockfolder.exe"C:\Users\Admin\AppData\Local\Temp\lockfolder.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe FileHook.dll /s2⤵
- Loads dropped DLL
- Modifies registry class
PID:2624
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe FileBho.dll /s2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
442KB
MD53fcdcbae358301e557fa2786078e5552
SHA176137300f6527076add1b819083db3a46854dee0
SHA256a8443d0bfa626b818dbb09de2305e56ab0f1ebeebb1da6aabd7599523c0daf77
SHA5121028a719a56a91a48979b324904edd34ab54811a1c2c9d5fe34189a2b8bea31a9bc384abdaf43b9dad824d7662b83566745e9a3a14fff08e0998456cb782d20d
-
Filesize
127KB
MD5a5da15da770f9b00926cdcc6baed7fff
SHA10abb35c6b3f6d27c08bdd5679891c1a9a43179d2
SHA25638c8637696d8f485889b9ab2a995d8c86573915e2f1c74878bbe6bfd8165dbf8
SHA51238740e71a9db1725f3a50ea90407b61948d09ef9a29995bb3480d9a382a90f2bdd46bd5e09416f894625ad6c8a80bde88802a540002bd5530c557551b5b3979c