Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 12:55
Behavioral task
behavioral1
Sample
EncryptedLol.exe
Resource
win10v2004-20240802-en
General
-
Target
EncryptedLol.exe
-
Size
93KB
-
MD5
f5c51640867e02739b95b34eb8bd4a25
-
SHA1
2f8e5bcbe79a1a689b74dfdc9918dbd85d7bf487
-
SHA256
4884c28b2097754640eea40a2f4f120aef22c5634510c3d2ef8870131df63c93
-
SHA512
4eca205dc551ad0ee99cad60c5f84b25f5c1bb4300de6278e11bc5cb6272d7a6f86e7e6a0827fd60b2236dc1787187ee106a3d727ef85a790665dc480fece901
-
SSDEEP
1536:o//r7EkrjaFIs7E5OxzJn8LjEwzGi1dDCD/gS:o/7jau5OVVni1d8Y
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 3416 netsh.exe 3884 netsh.exe 4704 netsh.exe 768 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation EncryptedLol.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4ea035cf87e2b7f7f04873ba5d377a74Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4ea035cf87e2b7f7f04873ba5d377a74Windows Update.exe server.exe -
Executes dropped EXE 1 IoCs
pid Process 3156 server.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Explower.exe server.exe File opened for modification C:\Program Files (x86)\Explower.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EncryptedLol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4672 PING.EXE 2932 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4672 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3156 server.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3156 server.exe Token: 33 3156 server.exe Token: SeIncBasePriorityPrivilege 3156 server.exe Token: 33 3156 server.exe Token: SeIncBasePriorityPrivilege 3156 server.exe Token: 33 3156 server.exe Token: SeIncBasePriorityPrivilege 3156 server.exe Token: 33 624 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 624 AUDIODG.EXE Token: 33 3156 server.exe Token: SeIncBasePriorityPrivilege 3156 server.exe Token: 33 3156 server.exe Token: SeIncBasePriorityPrivilege 3156 server.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3156 3736 EncryptedLol.exe 87 PID 3736 wrote to memory of 3156 3736 EncryptedLol.exe 87 PID 3736 wrote to memory of 3156 3736 EncryptedLol.exe 87 PID 3156 wrote to memory of 4704 3156 server.exe 89 PID 3156 wrote to memory of 4704 3156 server.exe 89 PID 3156 wrote to memory of 4704 3156 server.exe 89 PID 3156 wrote to memory of 768 3156 server.exe 91 PID 3156 wrote to memory of 768 3156 server.exe 91 PID 3156 wrote to memory of 768 3156 server.exe 91 PID 3156 wrote to memory of 3416 3156 server.exe 92 PID 3156 wrote to memory of 3416 3156 server.exe 92 PID 3156 wrote to memory of 3416 3156 server.exe 92 PID 3156 wrote to memory of 3884 3156 server.exe 107 PID 3156 wrote to memory of 3884 3156 server.exe 107 PID 3156 wrote to memory of 3884 3156 server.exe 107 PID 3156 wrote to memory of 2932 3156 server.exe 109 PID 3156 wrote to memory of 2932 3156 server.exe 109 PID 3156 wrote to memory of 2932 3156 server.exe 109 PID 2932 wrote to memory of 4672 2932 cmd.exe 111 PID 2932 wrote to memory of 4672 2932 cmd.exe 111 PID 2932 wrote to memory of 4672 2932 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\EncryptedLol.exe"C:\Users\Admin\AppData\Local\Temp\EncryptedLol.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4704
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:768
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3416
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3884
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4672
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f8 0x4941⤵
- Suspicious use of AdjustPrivilegeToken
PID:624
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5f5c51640867e02739b95b34eb8bd4a25
SHA12f8e5bcbe79a1a689b74dfdc9918dbd85d7bf487
SHA2564884c28b2097754640eea40a2f4f120aef22c5634510c3d2ef8870131df63c93
SHA5124eca205dc551ad0ee99cad60c5f84b25f5c1bb4300de6278e11bc5cb6272d7a6f86e7e6a0827fd60b2236dc1787187ee106a3d727ef85a790665dc480fece901
-
Filesize
5B
MD58fc22f973bec7f0525710dcf02f05edf
SHA1418f88fe2c59f8d9579994aec4034d785e8ac00c
SHA256ba0e21ceb11b1ec62709b0141373ce65de5a156b822c9b6d3c3f9ed9ab224a46
SHA512ac280118b4b0ee9643ecc464bfc91682ccccd530efa81dcc3d9471044305d59de661f865560206f089822299cb431dbad9f81a16ad667251375746d406f2b44d