Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1Project-LS...in.zip
windows7-x64
1Project-LS...in.zip
windows10-2004-x64
3Project-LS...ICENSE
windows7-x64
1Project-LS...ICENSE
windows10-2004-x64
1Project-LS...SD.zip
windows7-x64
1Project-LS...SD.zip
windows10-2004-x64
1LSD.bat
windows7-x64
8LSD.bat
windows10-2004-x64
10Project-LS...DME.md
windows7-x64
3Project-LS...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
Project-LSD-Gorilla-Tag-main.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Project-LSD-Gorilla-Tag-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Project-LSD-Gorilla-Tag-main/LICENSE
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Project-LSD-Gorilla-Tag-main/LICENSE
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Project-LSD-Gorilla-Tag-main/LSD.zip
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Project-LSD-Gorilla-Tag-main/LSD.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
LSD.bat
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
LSD.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Project-LSD-Gorilla-Tag-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Project-LSD-Gorilla-Tag-main/README.md
Resource
win10v2004-20240802-en
General
-
Target
Project-LSD-Gorilla-Tag-main/README.md
-
Size
96B
-
MD5
8f87ff22969f178a7e4f5a446506ba43
-
SHA1
cb7cf905edc0f9433c3358ef3315d74adf8d8dde
-
SHA256
25ed546714b7110d8c7fbd2c792714665f03f343ffc6e05d1f378fcb4afddc03
-
SHA512
a6ee624a2be1841c8adc74c1a04b0c6031b9b7fd9d00ac83f4d53d5f31414926948784e2ce8151adc4d43d861f27cab9311954bedd5443383d5bb861c346ddf6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.md rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1792 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1792 AcroRd32.exe 1792 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2260 2988 cmd.exe 29 PID 2988 wrote to memory of 2260 2988 cmd.exe 29 PID 2988 wrote to memory of 2260 2988 cmd.exe 29 PID 2260 wrote to memory of 1792 2260 rundll32.exe 30 PID 2260 wrote to memory of 1792 2260 rundll32.exe 30 PID 2260 wrote to memory of 1792 2260 rundll32.exe 30 PID 2260 wrote to memory of 1792 2260 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Project-LSD-Gorilla-Tag-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Project-LSD-Gorilla-Tag-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Project-LSD-Gorilla-Tag-main\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ac5774946eb6f9c1d85eebb86235ad28
SHA1f53380376cf621c1bd5b54ff50853fcd941e8e52
SHA2567e2f0fcb7496907966b3041e45f6dc9c23e9cdd37d29fb7f249cb1f44b694946
SHA512f034a101b7604bc53b8a65d544dcf61237339c7d2b23af11d4b758c088050895a05548aa04881d91845b6b82d39f0b2752e5cb1f883d28f897fbcbce8acc0363