Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe
Resource
win10v2004-20241007-en
General
-
Target
952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe
-
Size
385KB
-
MD5
bc7aed3bd7f514c6e42cbe5fe4fdd880
-
SHA1
6e6e0bead274f321028383d7f19a650642b89d17
-
SHA256
952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818ba
-
SHA512
d8f6490d632059d11fbc59e26454d98f67b944d713d46b0e7335e42431efc7d5b60d3719a03457b9a9b52a3a05754197c793b8420a9b046c79c21a71ecbe4c97
-
SSDEEP
12288:vkQrEPy59SLWy5jy59SL3y59Ey59SLAy59SLZy5iy59SLv:vkm4y7oWypy7o3y7Ey7oAy7oZyUy7ov
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmpcca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmpcca32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpnopm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpnopm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lghgmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lghgmg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe -
Berbew family
-
Executes dropped EXE 4 IoCs
pid Process 2728 Lmpcca32.exe 2164 Lpnopm32.exe 2888 Lghgmg32.exe 1748 Lepaccmo.exe -
Loads dropped DLL 12 IoCs
pid Process 2412 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe 2412 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe 2728 Lmpcca32.exe 2728 Lmpcca32.exe 2164 Lpnopm32.exe 2164 Lpnopm32.exe 2888 Lghgmg32.exe 2888 Lghgmg32.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Agpdah32.dll 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe File opened for modification C:\Windows\SysWOW64\Lpnopm32.exe Lmpcca32.exe File created C:\Windows\SysWOW64\Dllqqh32.dll Lmpcca32.exe File created C:\Windows\SysWOW64\Oldhgaef.dll Lghgmg32.exe File created C:\Windows\SysWOW64\Lmpcca32.exe 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe File opened for modification C:\Windows\SysWOW64\Lmpcca32.exe 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe File created C:\Windows\SysWOW64\Lpnopm32.exe Lmpcca32.exe File created C:\Windows\SysWOW64\Lghgmg32.exe Lpnopm32.exe File opened for modification C:\Windows\SysWOW64\Lghgmg32.exe Lpnopm32.exe File created C:\Windows\SysWOW64\Ogegmkqk.dll Lpnopm32.exe File created C:\Windows\SysWOW64\Lepaccmo.exe Lghgmg32.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Lghgmg32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2588 1748 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmpcca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpnopm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lghgmg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepaccmo.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lpnopm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogegmkqk.dll" Lpnopm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmpcca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lghgmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agpdah32.dll" 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dllqqh32.dll" Lmpcca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmpcca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpnopm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oldhgaef.dll" Lghgmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lghgmg32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2728 2412 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe 30 PID 2412 wrote to memory of 2728 2412 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe 30 PID 2412 wrote to memory of 2728 2412 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe 30 PID 2412 wrote to memory of 2728 2412 952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe 30 PID 2728 wrote to memory of 2164 2728 Lmpcca32.exe 31 PID 2728 wrote to memory of 2164 2728 Lmpcca32.exe 31 PID 2728 wrote to memory of 2164 2728 Lmpcca32.exe 31 PID 2728 wrote to memory of 2164 2728 Lmpcca32.exe 31 PID 2164 wrote to memory of 2888 2164 Lpnopm32.exe 32 PID 2164 wrote to memory of 2888 2164 Lpnopm32.exe 32 PID 2164 wrote to memory of 2888 2164 Lpnopm32.exe 32 PID 2164 wrote to memory of 2888 2164 Lpnopm32.exe 32 PID 2888 wrote to memory of 1748 2888 Lghgmg32.exe 33 PID 2888 wrote to memory of 1748 2888 Lghgmg32.exe 33 PID 2888 wrote to memory of 1748 2888 Lghgmg32.exe 33 PID 2888 wrote to memory of 1748 2888 Lghgmg32.exe 33 PID 1748 wrote to memory of 2588 1748 Lepaccmo.exe 34 PID 1748 wrote to memory of 2588 1748 Lepaccmo.exe 34 PID 1748 wrote to memory of 2588 1748 Lepaccmo.exe 34 PID 1748 wrote to memory of 2588 1748 Lepaccmo.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe"C:\Users\Admin\AppData\Local\Temp\952963db2361d6544429535c624defd8bfaa6bfec35bc2427c1c8b5d835818baN.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\Lmpcca32.exeC:\Windows\system32\Lmpcca32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Lpnopm32.exeC:\Windows\system32\Lpnopm32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\Lghgmg32.exeC:\Windows\system32\Lghgmg32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Lepaccmo.exeC:\Windows\system32\Lepaccmo.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 1406⤵
- Loads dropped DLL
- Program crash
PID:2588
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD579d3348de235874b15926ee9dc425436
SHA1d6256e38a4da50bf185d2c75409c4963127566ff
SHA25612aa6638f3d3fa3284235c00f1ef8dc49ac4a9cb660be120f3f2673b0605623e
SHA512d396b83de5f7013f48a2b20235405c1be061ebca7a0e3e8c08ed9a45ceb9241185e1c9d975368f4f0306cef4caca07a42cd89b1821bedf43c2725c425839cb8e
-
Filesize
385KB
MD5cea4f0c96a242178de9fe681f5709e1f
SHA1d5dc79311d781e12a1a08f59a1e7609f13c8c5e2
SHA2562bd7c2d81e89bffe689e7a059f61cfc5b6af22f3d4d2fea68d3b0304515da403
SHA5129c2a2da070c0dac790a79fb45f4acaf3662a1db2f4020b8c6c5bfec75775eec2aa4ec09167b8f186c4879c36fc0ce7e3d66363ccef6cf38760c982c4aff35ac9
-
Filesize
385KB
MD5ba56b05381ca410974e72c5f52c9806a
SHA1dcc33158fd16c53534f9779ce83aa0a641752278
SHA25685a684c2cdc744790a065923d782e50ad45a77017cf4316e98a0ee5704b7c412
SHA51235faedea19078894e9e3aa255e7ca4961294419fb041120291dc3845afa34eb53a0d2218edee789f5a0fa483cd72d94bf49ab0409bb79402f3c656fdf036bd23
-
Filesize
385KB
MD5d4206a2976de3f8d8845a63fa05d2409
SHA1e5086e96417e04599c9cf43bb01a4d67fbf7770b
SHA2562096ae465635dbc966472a87c4e54a570558e239abcc69adc516edc9a13398f7
SHA512ae380c565b9196071e9a5177d6de7a0c969d285363f4499c0fc0c0e53e24e2572cfda767dd0f24908c780eb6f04b317bf566e4947e7d95b3ff1dacb2f78c22e7