Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
{04830965-76E6-6A9A-8EE1-6AF7499C1D08}.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
{04830965-76E6-6A9A-8EE1-6AF7499C1D08}.zip
Resource
win10v2004-20241007-en
General
-
Target
{04830965-76E6-6A9A-8EE1-6AF7499C1D08}.zip
-
Size
160KB
-
MD5
ba9ad420b3560110b323b1145212fa0f
-
SHA1
37c0b397385c14c181f9d29dde39996a0394cbe9
-
SHA256
b711d6247a467d516c23151639608177e37c80e80d09d6afd4766a7daac1637e
-
SHA512
20a8baf51e11ab081be713166e2f48884f200a019b571816ea93c7f86d125e6fdbb1e892f7765b2f6c36aa800c913970ad0e59bef94d3c56f9a88a3b2c7541fd
-
SSDEEP
3072:93FuyHZtF389cNNTK5rX81YVvyeH83xqemprWMvhD6O7PMshMaeT8oBP:9c6FsWNNTUrsmt5chhmYsl6O7PMYjA8a
Malware Config
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 3 IoCs
resource yara_rule behavioral2/files/0x000200000001e77e-2.dat family_lockbit behavioral2/memory/776-3-0x0000000000400000-0x000000000042C000-memory.dmp family_lockbit behavioral2/memory/776-5-0x0000000000400000-0x000000000042C000-memory.dmp family_lockbit -
Executes dropped EXE 2 IoCs
pid Process 776 {04830965-76E6-6A9A-8EE1-6AF7499C1D08}.exe 3852 {04830965-76E6-6A9A-8EE1-6AF7499C1D08}.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2264 776 WerFault.exe 94 4004 3852 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {04830965-76E6-6A9A-8EE1-6AF7499C1D08}.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3780 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3780 7zFM.exe Token: 35 3780 7zFM.exe Token: SeSecurityPrivilege 3780 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3780 7zFM.exe 3780 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\{04830965-76E6-6A9A-8EE1-6AF7499C1D08}.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3780
-
C:\Users\Admin\Desktop\{04830965-76E6-6A9A-8EE1-6AF7499C1D08}.exe"C:\Users\Admin\Desktop\{04830965-76E6-6A9A-8EE1-6AF7499C1D08}.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 2522⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 776 -ip 7761⤵PID:2780
-
C:\Users\Admin\Desktop\{04830965-76E6-6A9A-8EE1-6AF7499C1D08}.exe"C:\Users\Admin\Desktop\{04830965-76E6-6A9A-8EE1-6AF7499C1D08}.exe"1⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 2242⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3852 -ip 38521⤵PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD538745539b71cf201bb502437f891d799
SHA1f2a72bee623659d3ba16b365024020868246d901
SHA25680e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce
SHA512772e76757069c3375cf1ffd659ff03f47f2d4becae61a852adbc27ae467551210d8832994f944c05fccc8486a8a88322021c94217a8bd962c2459af41067132b