Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
Solara.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Solara.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Launcher.bat
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Launcher.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
compiler.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
compiler.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
lua51.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
lua51.dll
Resource
win10v2004-20240709-en
General
-
Target
Launcher.bat
-
Size
593B
-
MD5
b654b57d9b629ce512393a6adfcb9756
-
SHA1
e4b40f401102962e30e4a9820cd1031f5d1ab1ab
-
SHA256
b1149e7b5ae78c5d7b0178e19ea9bc5b353ea70e184edfccd8a80413af537975
-
SHA512
18e26a448c951efbc8fbec544a5bb19aba2610ae8516600894c4897fc2548f60ae0ab8eec8a24d2ff806909454d4aaac1a9d15fb662e5797b20619fbdb89294e
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Setup\Scripts\ErrorHandler.cmd compiler.exe File opened for modification C:\Windows\Setup\Scripts\ErrorHandler.cmd compiler.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3984 schtasks.exe 3200 schtasks.exe 3788 schtasks.exe 4568 schtasks.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3656 wrote to memory of 32 3656 cmd.exe 85 PID 3656 wrote to memory of 32 3656 cmd.exe 85 PID 3656 wrote to memory of 32 3656 cmd.exe 85 PID 32 wrote to memory of 3200 32 compiler.exe 100 PID 32 wrote to memory of 3200 32 compiler.exe 100 PID 32 wrote to memory of 3200 32 compiler.exe 100 PID 32 wrote to memory of 3788 32 compiler.exe 102 PID 32 wrote to memory of 3788 32 compiler.exe 102 PID 32 wrote to memory of 3788 32 compiler.exe 102 PID 32 wrote to memory of 2472 32 compiler.exe 104 PID 32 wrote to memory of 2472 32 compiler.exe 104 PID 32 wrote to memory of 2472 32 compiler.exe 104 PID 2472 wrote to memory of 4568 2472 compiler.exe 105 PID 2472 wrote to memory of 4568 2472 compiler.exe 105 PID 2472 wrote to memory of 4568 2472 compiler.exe 105 PID 2472 wrote to memory of 3984 2472 compiler.exe 106 PID 2472 wrote to memory of 3984 2472 compiler.exe 106 PID 2472 wrote to memory of 3984 2472 compiler.exe 106 PID 2472 wrote to memory of 4500 2472 compiler.exe 109 PID 2472 wrote to memory of 4500 2472 compiler.exe 109 PID 2472 wrote to memory of 4500 2472 compiler.exe 109
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\compiler.execompiler.exe conf.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 13:07 /f /tn EmailCleanupTask_ODA0 /tr ""C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\ODA0.exe" "C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\conf.txt""3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 13:07 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\compiler.exe"C:\Users\Admin\AppData\Local\Temp\compiler.exe" "C:\Users\Admin\AppData\Roaming\conf.lua"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 10:18 /f /tn WordProcessorTask_ODA0 /tr ""C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\ODA0.exe" "C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\conf.lua""4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 10:18 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\compiler.exe"C:\Users\Admin\AppData\Local\Temp\compiler.exe" "C:\Users\Admin\AppData\Roaming\conf.lua"4⤵PID:4500
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281B
MD55901b87dff7c7fbd7339624c7cad72d9
SHA1d338575e4585d65e10a791e6b6d276cc8250febb
SHA2560081272d5446e4866cdf7740ba53dc9846282f0363ae0f1cc0c6c339e2820851
SHA51274091be714ed197ecdd27fe24038662b7fa356ddc1ec35fe4498751acf8cf35d5f4bb1d30f7ea9d1e993d060da4fe8c8445c6d9e46dedbbcc18e64e6863f3374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize1KB
MD5ab4f14a5462720297f97ff6589aaf525
SHA111de38a54e7701565e51c6d2398db224d91344ef
SHA256fd064d667c352c1c53ec134be009b7f837251ddf430f639ffdbade5cf9791827
SHA512cb4c8f683d7a7a1b634153e92e9386c5909789b1d9007c3448d9205aad9abb14cfcf6267247ee0a8130afef943e4e679f84a3235f4f924942d314d496adced20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize979B
MD5116e2e525d151ef225b8918992aaf542
SHA1f16f24d093a8b01a7bc155742ad07bb4e68ebf4d
SHA256162dfc2aee189004af5c6186f004d7a909337be21e0cd81dff66b8ba19c0888a
SHA5127f3de6c601c531eb7b20e69a584f8129c74b966914e7d4421f7b5cd7384de30429c25b047f6684862cdd67b1ae8a92af24559fe727a1d4432387d5c871139a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize471B
MD541fb85998718a60639a4846feca331c7
SHA1c8285ee1823f298765c00efa1a7036a23e03789a
SHA256309bdd62e6ac4b286b0d77f8ae76815b1ae5cc262af5f44d52869839da093ce6
SHA51278331eef9b51b754599eb4de2693de11c84dadbb06394670e359de562e490c484c7b5a218d0357d9cdca99b35ad2d44063b97eeef7ec55759cbbde765c36e23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A66A8DB907BADC9D16AD67B2FBFFDD5C
Filesize480B
MD593bec93889323e3cf46cd643bdef107c
SHA1601bf67031c586b1a6da0c426949c895b1e5c87d
SHA256ab61f1a9008c96f59377ca570f7515d4d79389ae1f89d184e078d3fede2202cb
SHA512e3bf65aa13dc3801ad8e2078ce2060cb935927a624d0b7ab22a87d3c6a985ca655e6d307420010caf6aad1a785f4a024f152da4565ea070d94bec7c0d9cfd7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD5e93d32075edcfa6c5f24c53560a197c7
SHA15baa80c49c4da4ba8e030e7d77e079112581aea9
SHA256add0564d342d951af7970b229c60496be65e316f75a0dfa890d45eed62a416f0
SHA5122cdb76acd484bfb9d99226bf36114d5f60300bd40a9bf579cb475b3e5762e399d38319064e6047b4677cd50ec417ed4debb45c3106c0e7faf23f3ead632fe623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize480B
MD5280057f01b5183bf905ebf5a6375500f
SHA1294791e413f348b2a36375e08185c2b386f6717d
SHA256af2ecce4c6b8aa6491f60d517c5e3569a097b640eb696fd8e3a347598bebbce3
SHA5129f260db6d52d3f114dbebae5944f25382f1c4b1d5354b9292a5b48f30cd31f9d8297812da5a7ac2a3142978b052a90535e9e75f2337149be8a5bae22e2daed17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize412B
MD5cbec75da81206672ca91a20a7f93f2df
SHA16305874266d5bd0087159115467011c0f9fe60d2
SHA2562d2dbe1fb28136e2279f1c897254e0455ae724fc46b8e9ab58c9e8cec4b5efce
SHA512a5d91b3e28a71ed3f7c5f9e93ad35887b8630cf3c5077f9326da03aab7aeecf88dac81179508f2215f8b4274ed8755dd877d3e65db189944ef62fee78ae3feaf
-
Filesize
311B
MD59105750f17d90587cfdb3073e3db4b41
SHA168299e57ccb94050710511c9fba7f144af55038d
SHA256325bea9d40295cd711d613b7dcb0958e04a537f751b177573a9c40303a4879f9
SHA51207fcd8e2811bc7d8a481694d32a8d220a03ec99dfd8b9f55de99ff8327d392c6afbd821358b5087e29120b5a6d706f258c723585d3c69a26c1b0c385722256de
-
Filesize
902KB
MD5f8e7e868de711849ecd8ae2aa520bb53
SHA138633c09c4d6f8cdd4fcb6bb2c06f64068a0a329
SHA2562331da365e6824a2d00c58fe6b00c652bfccb7df8a3ab936492df7af0312a4a4
SHA5129b2af2124ec953f0a1538d54a91449281e5b8f67d8a8d9329990805e10ce5fed7af53f161f8035209a9c57c00312bc73bf9c5d186ffdcdfb1161f50e3b5b9c04
-
Filesize
300KB
MD56ae5064bfd998015ffd0a43e03b65a4f
SHA1a0d3e85cf565b5fc8308c32c056b3c9f93d8f562
SHA25618b0bf3046a0a3b4366cd731d1bfb0500a17aed3b2008709cdd591b5072319e1
SHA51224c3f3d417822990459e122722a3bd6a73fa7e5d0c0bad461d7d4d745f25786ef3f9ba2c19d15b8677535d4ce7f4eb812e61f203bc3610d19a9b607dbd790cba
-
Filesize
181B
MD5e74b85d9b2776532ebde58401eb46939
SHA1b60e3fab499ff895132b828d3925ad2c4be7c531
SHA25682d55f7784242bb5f6ada93656206b3467b46c5c97d863fc03b3e4428fb9811b
SHA5121e86f2125b27fb90f14140a1a69d032f4a0bb094d50c59607328058b3c8ae8c9a4440084dec19e88cbf68a93fec9b37af4f67a857f4388c8adb1e7ce444212ef