Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/03/2023, 21:41

230317-1j6b7acb5t 8

17/03/2023, 21:40

230317-1h82paab27 1

Analysis

  • max time kernel
    1600s
  • max time network
    1603s
  • platform
    windows7_x64
  • resource
    win7-20230220-es
  • resource tags

    arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    17/03/2023, 21:41

General

  • Target

    mcbot-main.zip

  • Size

    4.1MB

  • MD5

    e00f4960bf3de863ecab55af200712c1

  • SHA1

    b6aa9c80020be3584226cf83fbf3b39701d8928f

  • SHA256

    5747325bf9347e431412ae207c6e163dc1a9c968741989b12fe407a9cb440a8a

  • SHA512

    eacaaa47f0230d5150c775b1deb549fbcd5dc94fc6bc58a290eacd48c4f3d7395814b6a1239b4537ccd9b6c3d5d0e74251d93b975eefb4677a6bafa85b750539

  • SSDEEP

    98304:ckZ4Mp/g8GXOn+vnk/kI2k8RpIZrXdCq++/vID+pqxHmGN1:5Z5N+vnk/k5VyNb7vpQr

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\mcbot-main.zip
    1⤵
      PID:1208
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1004
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x4f4
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1452
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1808
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3430344531-3702557399-3004411149-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3430344531-3702557399-3004411149-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
          2⤵
          • Suspicious use of SetWindowsHookEx
          PID:596
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
          2⤵
            PID:1800
          • C:\Windows\system32\SearchProtocolHost.exe
            "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:1560
          • C:\Windows\system32\SearchFilterHost.exe
            "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
            2⤵
            • Modifies data under HKEY_USERS
            PID:1048
          • C:\Windows\system32\SearchFilterHost.exe
            "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
            2⤵
              PID:1608
            • C:\Windows\system32\SearchProtocolHost.exe
              "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe3_ Global\UsGthrCtrlFltPipeMssGthrPipe3 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
              2⤵
              • Suspicious use of SetWindowsHookEx
              PID:536
            • C:\Windows\system32\SearchFilterHost.exe
              "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
              2⤵
                PID:892
            • C:\Program Files\Java\jre7\bin\javaw.exe
              "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Temp1_mcbot-main.zip\mcbot-main\MCBOT.jar"
              1⤵
              • Suspicious behavior: GetForegroundWindowSpam
              PID:768
            • C:\Program Files\Java\jre7\bin\javaw.exe
              "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\Desktop\mcbot-main\mcbot-main\MCBOT.jar"
              1⤵
              • Suspicious behavior: GetForegroundWindowSpam
              PID:1156
            • C:\Program Files\Java\jre7\bin\javaw.exe
              "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\Desktop\mcbot-main\mcbot-main\MCBOT.jar"
              1⤵
              • Suspicious behavior: GetForegroundWindowSpam
              PID:844

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.chk

              Filesize

              8KB

              MD5

              38749ae4a056b9d3540ca7b750a21342

              SHA1

              27f97d9fa42a3c8f5d3a147e5b759b281574a2cf

              SHA256

              6b2d06625c1a2fe07044dc72c6221b489af44815484cb5fa8ebf62a25d5a19f1

              SHA512

              459a8892a2bff48d971e9922457951cdb4af3a9cc621cbd2c9b2d17f4d64801c1455c80cad52a9d88a97ee0ff646638a70c1ddcbe6f22c4255bb513866bb63ac

            • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

              Filesize

              1024KB

              MD5

              80b878b71b411b285250f5d77e03ded8

              SHA1

              793a99e4843cf613d5b176c34ad2d0e74b2d26ba

              SHA256

              bf483d543349eacdfdf8988dfd6d08adf9ea017965f9e0d757e783c1bd868d1c

              SHA512

              25f311fd427092639ecabc1b30da7b51c7fe9c60cfcfda01dda917c0aee48f0ac6cd6879dc8f9e8ec9422666c8c72681a1815961d651d2d272258a8b3c56c17e

            • memory/768-132-0x00000000004A0000-0x00000000004A1000-memory.dmp

              Filesize

              4KB

            • memory/844-154-0x0000000000120000-0x0000000000121000-memory.dmp

              Filesize

              4KB

            • memory/1048-175-0x000007FF18070000-0x000007FF1807A000-memory.dmp

              Filesize

              40KB

            • memory/1048-161-0x000007FF18070000-0x000007FF1807A000-memory.dmp

              Filesize

              40KB

            • memory/1808-107-0x0000000001070000-0x0000000001071000-memory.dmp

              Filesize

              4KB

            • memory/1808-169-0x00000000037E0000-0x00000000037E8000-memory.dmp

              Filesize

              32KB

            • memory/1808-122-0x0000000003340000-0x0000000003348000-memory.dmp

              Filesize

              32KB

            • memory/1808-54-0x0000000001740000-0x0000000001750000-memory.dmp

              Filesize

              64KB

            • memory/1808-105-0x0000000002B40000-0x0000000002B48000-memory.dmp

              Filesize

              32KB

            • memory/1808-99-0x0000000002BE0000-0x0000000002BE1000-memory.dmp

              Filesize

              4KB

            • memory/1808-159-0x0000000000FA0000-0x0000000000FA1000-memory.dmp

              Filesize

              4KB

            • memory/1808-93-0x0000000002B40000-0x0000000002B48000-memory.dmp

              Filesize

              32KB

            • memory/1808-167-0x00000000037E0000-0x00000000037E1000-memory.dmp

              Filesize

              4KB

            • memory/1808-116-0x0000000002BA0000-0x0000000002BA8000-memory.dmp

              Filesize

              32KB

            • memory/1808-170-0x0000000003810000-0x0000000003818000-memory.dmp

              Filesize

              32KB

            • memory/1808-171-0x00000000037E0000-0x00000000037E1000-memory.dmp

              Filesize

              4KB

            • memory/1808-70-0x0000000001840000-0x0000000001850000-memory.dmp

              Filesize

              64KB

            • memory/1808-180-0x0000000001110000-0x0000000001118000-memory.dmp

              Filesize

              32KB

            • memory/1808-181-0x0000000001100000-0x0000000001101000-memory.dmp

              Filesize

              4KB

            • memory/1808-185-0x0000000001100000-0x0000000001108000-memory.dmp

              Filesize

              32KB

            • memory/1808-187-0x0000000001110000-0x0000000001111000-memory.dmp

              Filesize

              4KB

            • memory/1808-193-0x0000000003930000-0x0000000003931000-memory.dmp

              Filesize

              4KB

            • memory/1808-203-0x00000000047D0000-0x00000000047D8000-memory.dmp

              Filesize

              32KB