Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
32c9045d39bb696ea2946a36f1ad6e60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32c9045d39bb696ea2946a36f1ad6e60N.exe
Resource
win10v2004-20240709-en
General
-
Target
32c9045d39bb696ea2946a36f1ad6e60N.exe
-
Size
66KB
-
MD5
32c9045d39bb696ea2946a36f1ad6e60
-
SHA1
48ca1a0fbeb6da1b04601f6d3949628405cdf92b
-
SHA256
6278921136bbcba97463cc35c8f4c47c8411ea04c4775328288b4bddaa1032e3
-
SHA512
e8461ba2a6afbc1bc369238933ebbc5741842b4fbaecb7fc4f8c8fbb7fd8dc45a5d2171fde33cebe3971b9b5c2222c646f5c082074e76fbcfd8ab2eddc29e8f8
-
SSDEEP
768:ZrItKyw5WHXfQIhIiIk9ecAaVPD96KyX63:Zr3Z5IfQIR81ad5yX63
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3020 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 32c9045d39bb696ea2946a36f1ad6e60N.exe -
Executes dropped EXE 1 IoCs
pid Process 400 lyghost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\lyghost.exe 32c9045d39bb696ea2946a36f1ad6e60N.exe File opened for modification C:\Windows\Debug\lyghost.exe 32c9045d39bb696ea2946a36f1ad6e60N.exe File opened for modification C:\Windows\Debug\lyghost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lyghost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32c9045d39bb696ea2946a36f1ad6e60N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4008 32c9045d39bb696ea2946a36f1ad6e60N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4008 wrote to memory of 3020 4008 32c9045d39bb696ea2946a36f1ad6e60N.exe 84 PID 4008 wrote to memory of 3020 4008 32c9045d39bb696ea2946a36f1ad6e60N.exe 84 PID 4008 wrote to memory of 3020 4008 32c9045d39bb696ea2946a36f1ad6e60N.exe 84 PID 4008 wrote to memory of 1784 4008 32c9045d39bb696ea2946a36f1ad6e60N.exe 90 PID 4008 wrote to memory of 1784 4008 32c9045d39bb696ea2946a36f1ad6e60N.exe 90 PID 4008 wrote to memory of 1784 4008 32c9045d39bb696ea2946a36f1ad6e60N.exe 90 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3020 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c9045d39bb696ea2946a36f1ad6e60N.exe"C:\Users\Admin\AppData\Local\Temp\32c9045d39bb696ea2946a36f1ad6e60N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\lyghost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\32C904~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
C:\Windows\Debug\lyghost.exeC:\Windows\Debug\lyghost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD504f1a3d167d174ae648c32a31fa6c694
SHA126c07dc6e8872549fa1aa2a18fb1c4e07bb21d84
SHA256f8c3fefbfe29d15eb54004c6ce224b581cecb0df2d597c11f50d729f82258d19
SHA51258437e05b3f8e8ed776d0d92e7d89e86e4f234afd9f172dc149a580ab6a1281f5bedc436d133e970c05091022c0e7cf20ad2776b1686cff972006b03c9914e59