Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
aa40c9905b57a9dab6b2f456da35ac60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aa40c9905b57a9dab6b2f456da35ac60N.exe
Resource
win10v2004-20240802-en
General
-
Target
aa40c9905b57a9dab6b2f456da35ac60N.exe
-
Size
448KB
-
MD5
aa40c9905b57a9dab6b2f456da35ac60
-
SHA1
cf0a5ba2efa34ca1ec0134ab4a362abd597c6b51
-
SHA256
437930c17751a51b5f4b2c1c72be3c7ea242db40bff3379b90836946f5af05c1
-
SHA512
4fbd823d7dca3ec6e7aaa5d7ebaf431fbe6f1361efe290c04bd58dd4bad3ac82763d49a8eebc5b1f46c23786eb6db98e50145732ecc59902a9dad97227002028
-
SSDEEP
6144:jpXekvI3Hw1xiLUmKyIxLDXXoq9FJZCUmKyIxL:Zt832XXf9Do3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad aa40c9905b57a9dab6b2f456da35ac60N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" aa40c9905b57a9dab6b2f456da35ac60N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liipnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Liipnb32.exe -
Executes dropped EXE 2 IoCs
pid Process 3036 Liipnb32.exe 2120 Lepaccmo.exe -
Loads dropped DLL 8 IoCs
pid Process 2376 aa40c9905b57a9dab6b2f456da35ac60N.exe 2376 aa40c9905b57a9dab6b2f456da35ac60N.exe 3036 Liipnb32.exe 3036 Liipnb32.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Liipnb32.exe aa40c9905b57a9dab6b2f456da35ac60N.exe File opened for modification C:\Windows\SysWOW64\Liipnb32.exe aa40c9905b57a9dab6b2f456da35ac60N.exe File created C:\Windows\SysWOW64\Iaimld32.dll aa40c9905b57a9dab6b2f456da35ac60N.exe File created C:\Windows\SysWOW64\Lepaccmo.exe Liipnb32.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Liipnb32.exe File created C:\Windows\SysWOW64\Oldhgaef.dll Liipnb32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2620 2120 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa40c9905b57a9dab6b2f456da35ac60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Liipnb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepaccmo.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 aa40c9905b57a9dab6b2f456da35ac60N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" aa40c9905b57a9dab6b2f456da35ac60N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oldhgaef.dll" Liipnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node aa40c9905b57a9dab6b2f456da35ac60N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID aa40c9905b57a9dab6b2f456da35ac60N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} aa40c9905b57a9dab6b2f456da35ac60N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iaimld32.dll" aa40c9905b57a9dab6b2f456da35ac60N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Liipnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Liipnb32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3036 2376 aa40c9905b57a9dab6b2f456da35ac60N.exe 30 PID 2376 wrote to memory of 3036 2376 aa40c9905b57a9dab6b2f456da35ac60N.exe 30 PID 2376 wrote to memory of 3036 2376 aa40c9905b57a9dab6b2f456da35ac60N.exe 30 PID 2376 wrote to memory of 3036 2376 aa40c9905b57a9dab6b2f456da35ac60N.exe 30 PID 3036 wrote to memory of 2120 3036 Liipnb32.exe 31 PID 3036 wrote to memory of 2120 3036 Liipnb32.exe 31 PID 3036 wrote to memory of 2120 3036 Liipnb32.exe 31 PID 3036 wrote to memory of 2120 3036 Liipnb32.exe 31 PID 2120 wrote to memory of 2620 2120 Lepaccmo.exe 32 PID 2120 wrote to memory of 2620 2120 Lepaccmo.exe 32 PID 2120 wrote to memory of 2620 2120 Lepaccmo.exe 32 PID 2120 wrote to memory of 2620 2120 Lepaccmo.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa40c9905b57a9dab6b2f456da35ac60N.exe"C:\Users\Admin\AppData\Local\Temp\aa40c9905b57a9dab6b2f456da35ac60N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Liipnb32.exeC:\Windows\system32\Liipnb32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\Lepaccmo.exeC:\Windows\system32\Lepaccmo.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 1404⤵
- Loads dropped DLL
- Program crash
PID:2620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5509a490e7a96a1ff6620f6ffde7f1a6c
SHA1de4ee6b6d86dc7f4ce573126f97c8bb56def120c
SHA25685e7e7ac707621d3e446f31ef6add41e7a517be4ef609a3d779121c73a03dba5
SHA512f6f93feb4aba62c0fe238cfa50e47476ef5bb9523cd90d6a1de6e362f8c0ee4d1d9d35c0982ad756f79e1cccd0cfb67dfa59be406914a5b046958f2cbf6c14d4
-
Filesize
448KB
MD56a3fd7797cf943d2d98b23dfb872cb28
SHA18f5c6ae5073d40eaadf3d45f1fff17dafbd704a2
SHA2564771c6ba331169d60ff11cd686e6037d3ae5ef90c667396f3d138f5b48bdebbf
SHA51268513238166e8acc8aae4963fa59f3012309516eaebadd5cc091512514f573aeb4715a79495f7d98a173c4cdf3a2c633cdb1f7e712044631d20c738315fea493