Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
ce5360d3d7237e90647ea49aacdf4d00N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce5360d3d7237e90647ea49aacdf4d00N.exe
Resource
win10v2004-20240802-en
General
-
Target
ce5360d3d7237e90647ea49aacdf4d00N.exe
-
Size
260KB
-
MD5
ce5360d3d7237e90647ea49aacdf4d00
-
SHA1
6e701e6e2fbe36390981a8de4961082e12fef1da
-
SHA256
92e209a74bce0160020f15e9c8881ea8a28e117b7f69dba72afbd0f79a0848ff
-
SHA512
22e3b587d9bd636ad242b3ebfd841652a70d73ee695e451fa66bd16fe813fc22245df55a630d5433f37b1b689c2d6d7db552545d8123aaf78d4f74c691c2d4eb
-
SSDEEP
6144:5W5ioScGBY5/fe10wDE4Hwkwvk6IKJA91INM:5WHiY5/feqwQuwsKU1INM
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1544 lodcgent.exe 3712 compayed.exe 800 ~9E53.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mmgatar = "C:\\Users\\Admin\\AppData\\Roaming\\iscsdiag\\lodcgent.exe" ce5360d3d7237e90647ea49aacdf4d00N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\compayed.exe ce5360d3d7237e90647ea49aacdf4d00N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4344 3852 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce5360d3d7237e90647ea49aacdf4d00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lodcgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compayed.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1544 lodcgent.exe 1544 lodcgent.exe 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe 3480 Explorer.EXE 3480 Explorer.EXE 3712 compayed.exe 3712 compayed.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 1544 lodcgent.exe Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3480 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3852 wrote to memory of 1544 3852 ce5360d3d7237e90647ea49aacdf4d00N.exe 88 PID 3852 wrote to memory of 1544 3852 ce5360d3d7237e90647ea49aacdf4d00N.exe 88 PID 3852 wrote to memory of 1544 3852 ce5360d3d7237e90647ea49aacdf4d00N.exe 88 PID 1544 wrote to memory of 800 1544 lodcgent.exe 90 PID 1544 wrote to memory of 800 1544 lodcgent.exe 90 PID 800 wrote to memory of 3480 800 ~9E53.tmp 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\ce5360d3d7237e90647ea49aacdf4d00N.exe"C:\Users\Admin\AppData\Local\Temp\ce5360d3d7237e90647ea49aacdf4d00N.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Roaming\iscsdiag\lodcgent.exe"C:\Users\Admin\AppData\Roaming\iscsdiag"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\~9E53.tmp3480 266248 1544 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 6243⤵
- Program crash
PID:4344
-
-
-
C:\Windows\SysWOW64\compayed.exeC:\Windows\SysWOW64\compayed.exe -s1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3852 -ip 38521⤵PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
260KB
MD5df177fc8f143d42016785a9e1ee982ce
SHA1140fe988a7b3853465a8a8098eaec88e96ae9423
SHA2561361480aaa244db540140bd49264c13a6dc18b74233002c94f627b659d7fbda3
SHA512262e12fc34c78959ad818ee6b88ef24f141d1abd96e09c0906f9773a0675913f20c0a0cdccba879d31ce239b5609e3d90d7d98c2dc4c20725e57c469073f2387