Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 14:00
Behavioral task
behavioral1
Sample
LBLeak/Build.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LBLeak/Build.bat
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
LBLeak/builder.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
LBLeak/builder.exe
Resource
win11-20250218-en
Behavioral task
behavioral5
Sample
LBLeak/keygen.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
LBLeak/keygen.exe
Resource
win11-20250217-en
General
-
Target
LBLeak/Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 7 IoCs
pid Process 2000 keygen.exe 1808 builder.exe 3048 builder.exe 2128 builder.exe 2144 builder.exe 2124 builder.exe 2328 builder.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2000 3028 cmd.exe 31 PID 3028 wrote to memory of 2000 3028 cmd.exe 31 PID 3028 wrote to memory of 2000 3028 cmd.exe 31 PID 3028 wrote to memory of 2000 3028 cmd.exe 31 PID 3028 wrote to memory of 1808 3028 cmd.exe 32 PID 3028 wrote to memory of 1808 3028 cmd.exe 32 PID 3028 wrote to memory of 1808 3028 cmd.exe 32 PID 3028 wrote to memory of 1808 3028 cmd.exe 32 PID 3028 wrote to memory of 3048 3028 cmd.exe 33 PID 3028 wrote to memory of 3048 3028 cmd.exe 33 PID 3028 wrote to memory of 3048 3028 cmd.exe 33 PID 3028 wrote to memory of 3048 3028 cmd.exe 33 PID 3028 wrote to memory of 2128 3028 cmd.exe 34 PID 3028 wrote to memory of 2128 3028 cmd.exe 34 PID 3028 wrote to memory of 2128 3028 cmd.exe 34 PID 3028 wrote to memory of 2128 3028 cmd.exe 34 PID 3028 wrote to memory of 2144 3028 cmd.exe 35 PID 3028 wrote to memory of 2144 3028 cmd.exe 35 PID 3028 wrote to memory of 2144 3028 cmd.exe 35 PID 3028 wrote to memory of 2144 3028 cmd.exe 35 PID 3028 wrote to memory of 2124 3028 cmd.exe 36 PID 3028 wrote to memory of 2124 3028 cmd.exe 36 PID 3028 wrote to memory of 2124 3028 cmd.exe 36 PID 3028 wrote to memory of 2124 3028 cmd.exe 36 PID 3028 wrote to memory of 2328 3028 cmd.exe 37 PID 3028 wrote to memory of 2328 3028 cmd.exe 37 PID 3028 wrote to memory of 2328 3028 cmd.exe 37 PID 3028 wrote to memory of 2328 3028 cmd.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\LBLeak\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\LBLeak\Build -pubkey pub.key -privkey priv.key2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3Decryptor.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_pass.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_Rundll32.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_Rundll32_pass.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_ReflectiveDll_DllMain.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD5bebcdee76f09cec54df01dbfae50f576
SHA148e86185c0db2c7c102cb65e43ed741e030fee90
SHA2568dc1366b57878c09b7d717d67b310d4011adb51ee218ecafd8676ab9f1e535ce
SHA512c3ddf022447203a96fbd8593d779a028997fd6d066eb7ae48b0c0c62282751878d41ffc74fe11d29df3080e299fc9a7c4f7366ce9031d725ef313e8ef8c4d903
-
Filesize
344B
MD5646fa09002c8dc64f56fbd89f5d4e883
SHA1321b7c8e6c459862da50fd44ab7e68af88546324
SHA256259764f3dfe54bb9dae8346bdd190335f200e167bc2ae27ab689ad57c0816d4c
SHA512729946b1fb45eea61362712fe1a98f28ae48dee41b0cd76ba0fc2cd6675559747d3268125c9a885a2e7b0665b83db1066427263ef0cc6f1d72a316457998a123