Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 09:07

General

  • Target

    aa40c9905b57a9dab6b2f456da35ac60N.exe

  • Size

    448KB

  • MD5

    aa40c9905b57a9dab6b2f456da35ac60

  • SHA1

    cf0a5ba2efa34ca1ec0134ab4a362abd597c6b51

  • SHA256

    437930c17751a51b5f4b2c1c72be3c7ea242db40bff3379b90836946f5af05c1

  • SHA512

    4fbd823d7dca3ec6e7aaa5d7ebaf431fbe6f1361efe290c04bd58dd4bad3ac82763d49a8eebc5b1f46c23786eb6db98e50145732ecc59902a9dad97227002028

  • SSDEEP

    6144:jpXekvI3Hw1xiLUmKyIxLDXXoq9FJZCUmKyIxL:Zt832XXf9Do3

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa40c9905b57a9dab6b2f456da35ac60N.exe
    "C:\Users\Admin\AppData\Local\Temp\aa40c9905b57a9dab6b2f456da35ac60N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\SysWOW64\Liipnb32.exe
      C:\Windows\system32\Liipnb32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\SysWOW64\Lepaccmo.exe
        C:\Windows\system32\Lepaccmo.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 140
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\Lepaccmo.exe

    Filesize

    448KB

    MD5

    509a490e7a96a1ff6620f6ffde7f1a6c

    SHA1

    de4ee6b6d86dc7f4ce573126f97c8bb56def120c

    SHA256

    85e7e7ac707621d3e446f31ef6add41e7a517be4ef609a3d779121c73a03dba5

    SHA512

    f6f93feb4aba62c0fe238cfa50e47476ef5bb9523cd90d6a1de6e362f8c0ee4d1d9d35c0982ad756f79e1cccd0cfb67dfa59be406914a5b046958f2cbf6c14d4

  • \Windows\SysWOW64\Liipnb32.exe

    Filesize

    448KB

    MD5

    6a3fd7797cf943d2d98b23dfb872cb28

    SHA1

    8f5c6ae5073d40eaadf3d45f1fff17dafbd704a2

    SHA256

    4771c6ba331169d60ff11cd686e6037d3ae5ef90c667396f3d138f5b48bdebbf

    SHA512

    68513238166e8acc8aae4963fa59f3012309516eaebadd5cc091512514f573aeb4715a79495f7d98a173c4cdf3a2c633cdb1f7e712044631d20c738315fea493

  • memory/2120-28-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2120-50-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2376-0-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2376-14-0x00000000002D0000-0x0000000000330000-memory.dmp

    Filesize

    384KB

  • memory/2376-12-0x00000000002D0000-0x0000000000330000-memory.dmp

    Filesize

    384KB

  • memory/2376-40-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/3036-19-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/3036-27-0x0000000000220000-0x0000000000280000-memory.dmp

    Filesize

    384KB

  • memory/3036-44-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB