Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
3processlas...64.exe
windows10-2004-x64
9$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3CPUEater.exe
windows10-2004-x64
1Insights.exe
windows10-2004-x64
1InstallHelper.exe
windows10-2004-x64
1LogViewer.exe
windows10-2004-x64
1ProcessGovernor.exe
windows10-2004-x64
1ProcessLasso.exe
windows10-2004-x64
1ProcessLas...er.exe
windows10-2004-x64
5QuickUpgrade.exe
windows10-2004-x64
6ThreadRacer.exe
windows10-2004-x64
1TweakScheduler.exe
windows10-2004-x64
1bitsumsess...nt.exe
windows10-2004-x64
1pl-update.cmd
windows10-2004-x64
1pl.cmd
windows10-2004-x64
7plActivate.exe
windows10-2004-x64
1pl_rsrc_bulgarian.dll
windows10-2004-x64
1pl_rsrc_chinese.dll
windows10-2004-x64
1pl_rsrc_ch...al.dll
windows10-2004-x64
1pl_rsrc_english.dll
windows10-2004-x64
1pl_rsrc_finnish.dll
windows10-2004-x64
1pl_rsrc_french.dll
windows10-2004-x64
1pl_rsrc_german.dll
windows10-2004-x64
1pl_rsrc_italian.dll
windows10-2004-x64
1pl_rsrc_japanese.dll
windows10-2004-x64
1pl_rsrc_korean.dll
windows10-2004-x64
1pl_rsrc_polish.dll
windows10-2004-x64
1pl_rsrc_ptbr.dll
windows10-2004-x64
1pl_rsrc_russian.dll
windows10-2004-x64
1pl_rsrc_slovenian.dll
windows10-2004-x64
1Analysis
-
max time kernel
1355s -
max time network
1136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 15:47 UTC
Static task
static1
Behavioral task
behavioral1
Sample
processlassosetup64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
CPUEater.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
Insights.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
InstallHelper.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
LogViewer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
ProcessGovernor.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
ProcessLasso.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
ProcessLassoLauncher.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral12
Sample
QuickUpgrade.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
ThreadRacer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
TweakScheduler.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
bitsumsessionagent.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
pl-update.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
pl.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
plActivate.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
pl_rsrc_bulgarian.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
pl_rsrc_chinese.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
pl_rsrc_chinese_traditional.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
pl_rsrc_english.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
pl_rsrc_finnish.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
pl_rsrc_french.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
pl_rsrc_german.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
pl_rsrc_italian.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
pl_rsrc_japanese.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
pl_rsrc_korean.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
pl_rsrc_polish.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
pl_rsrc_ptbr.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
pl_rsrc_russian.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral32
Sample
pl_rsrc_slovenian.dll
Resource
win10v2004-20240709-en
General
-
Target
pl.cmd
-
Size
77B
-
MD5
aa54d58336d2565c369498d035737f8a
-
SHA1
c6a8791264081a6f854b30ac11477bdd83a8cbee
-
SHA256
9af8add66b2bb4a0252b65e0f13238055b601d689e8d29455d5b2c87f901fd7b
-
SHA512
82d9eeab7cb95f012b55d531ba7af84546be650702f40ca294c74858eca5eadc0ed7a87bc65122df4093e483dffe1e04e306845871955b2dc4f5113f1cf34838
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 856 ProcessLasso.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 InstallHelper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString InstallHelper.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessLasso.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ProcessLasso.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe 4372 InstallHelper.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 4372 InstallHelper.exe Token: SeDebugPrivilege 4372 InstallHelper.exe Token: SeChangeNotifyPrivilege 4372 InstallHelper.exe Token: SeIncBasePriorityPrivilege 4372 InstallHelper.exe Token: SeIncreaseQuotaPrivilege 4372 InstallHelper.exe Token: SeProfSingleProcessPrivilege 4372 InstallHelper.exe Token: SeAssignPrimaryTokenPrivilege 856 ProcessLasso.exe Token: SeDebugPrivilege 856 ProcessLasso.exe Token: SeChangeNotifyPrivilege 856 ProcessLasso.exe Token: SeIncBasePriorityPrivilege 856 ProcessLasso.exe Token: SeIncreaseQuotaPrivilege 856 ProcessLasso.exe Token: SeCreateGlobalPrivilege 856 ProcessLasso.exe Token: SeProfSingleProcessPrivilege 856 ProcessLasso.exe Token: SeBackupPrivilege 856 ProcessLasso.exe Token: SeRestorePrivilege 856 ProcessLasso.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4372 4832 cmd.exe 86 PID 4832 wrote to memory of 4372 4832 cmd.exe 86 PID 4832 wrote to memory of 3424 4832 cmd.exe 87 PID 4832 wrote to memory of 3424 4832 cmd.exe 87 PID 3424 wrote to memory of 856 3424 ProcessLassoLauncher.exe 88 PID 3424 wrote to memory of 856 3424 ProcessLassoLauncher.exe 88
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pl.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\InstallHelper.exeInstallHelper.exe /terminate2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\ProcessLassoLauncher.exeProcessLassoLauncher.exe /showwindow2⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\ProcessLasso.exe"C:\Users\Admin\AppData\Local\Temp\ProcessLasso.exe" "ProcessLassoLauncher.exe" "/showwindow"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A204.79.197.237dual-a-0034.a-msedge.netIN A13.107.21.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=2C7E145B34496B4A01AC00E135A96AB0; domain=.bing.com; expires=Wed, 06-Aug-2025 15:48:58 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 472545290E0A419280104132F5A9FA18 Ref B: LON04EDGE1114 Ref C: 2024-07-12T15:48:58Z
date: Fri, 12 Jul 2024 15:48:57 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=2C7E145B34496B4A01AC00E135A96AB0
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=HYdF2OZzDkKhhLV2RxxbdMl0hrhVC3FjHsUKEiSaleE; domain=.bing.com; expires=Wed, 06-Aug-2025 15:48:58 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 8EE2D196AC6942FEAAF9C334AFD3A9CE Ref B: LON04EDGE1114 Ref C: 2024-07-12T15:48:58Z
date: Fri, 12 Jul 2024 15:48:57 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=2C7E145B34496B4A01AC00E135A96AB0; MSPTC=HYdF2OZzDkKhhLV2RxxbdMl0hrhVC3FjHsUKEiSaleE
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 7881DF4986AF443E965DC1A82D9E6380 Ref B: LON04EDGE1114 Ref C: 2024-07-12T15:48:58Z
date: Fri, 12 Jul 2024 15:48:57 GMT
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request31.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request215.143.182.52.in-addr.arpaIN PTRResponse
-
204.79.197.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid=tls, http22.0kB 9.3kB 21 18
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7191ea9cf5b949aab4434d33e546f426&localId=w:7644E81C-AD49-10CC-B943-5E44723BEB42&deviceId=6896204247012457&anid=HTTP Response
204 -
322 B 7
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.23713.107.21.237
-
71 B 157 B 1 1
DNS Request
2.159.190.20.in-addr.arpa
-
73 B 143 B 1 1
DNS Request
237.197.79.204.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
81.144.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
31.243.111.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
215.143.182.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD58fcf7cf04f9b344724759ee830e97ff7
SHA17e89c71637362333246cb6f7b30f34a2b7693407
SHA256449c423ae1a63259989c85176dcc808f767346944eb40eac270ce27795abc1c2
SHA5123acc527ac9014db980d4c511fd416e32d627f616eb09559a2c3b0cb038a86eee6adf526488053fd09e34ba66fec6109bc534178e4371147d1b23f29803668759