Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30/03/2023, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe
Resource
win10v2004-20230220-en
General
-
Target
ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe
-
Size
1.0MB
-
MD5
7522139b87058f6fb9eb0633470f46f4
-
SHA1
b8b041fe6f62f8cc0aadafb275a3ec0bb08c8a88
-
SHA256
ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d
-
SHA512
17e9a22010a3994dff90ac93981d8e019b1a7bba8e16de2b4eab7dfc5b3dfe4b2733c38f95a6fd46eff4bc9d2f345fc94d5666e24b33000ac79935a2d38e0b8c
-
SSDEEP
24576:l0a5exWc7x4TyjheHod9XxeDNmRJLduNtjKaDaxSEFJd:lyUcGujPeDN4pu/2XxSEFb
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Loads dropped DLL 5 IoCs
pid Process 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CCB_HDZB_2G_P11.dll ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe File created C:\Windows\system32\CCB_HDZB_2G_P11.dll ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\CCBComponents\HDZB\log\20230330.log ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe File created C:\Program Files (x86)\CCBComponents\Plugins\npHDZB2gCertCtrl.dll ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe File created C:\Program Files (x86)\CCBComponents\Plugins\npHDZB2gSNCtrl.dll ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe File created C:\Program Files (x86)\CCBComponents\Plugins\CARoot\Cert_HDZB_2G_Firefox.exe ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 544 sc.exe 1620 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1640 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 27 PID 1088 wrote to memory of 1640 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 27 PID 1088 wrote to memory of 1640 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 27 PID 1088 wrote to memory of 1640 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 27 PID 1640 wrote to memory of 544 1640 cmd.exe 29 PID 1640 wrote to memory of 544 1640 cmd.exe 29 PID 1640 wrote to memory of 544 1640 cmd.exe 29 PID 1640 wrote to memory of 544 1640 cmd.exe 29 PID 1088 wrote to memory of 1756 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 30 PID 1088 wrote to memory of 1756 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 30 PID 1088 wrote to memory of 1756 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 30 PID 1088 wrote to memory of 1756 1088 ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe 30 PID 1756 wrote to memory of 1620 1756 cmd.exe 32 PID 1756 wrote to memory of 1620 1756 cmd.exe 32 PID 1756 wrote to memory of 1620 1756 cmd.exe 32 PID 1756 wrote to memory of 1620 1756 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe"C:\Users\Admin\AppData\Local\Temp\ab8f59fbee6491ee718c28a155d55d2a093e9f29f08754d2e1255a8c8028aa7d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.execmd /C C:\Windows\system32\sc.exe STOP "HDZB_DeviceService_For_CCB_2G"2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe STOP "HDZB_DeviceService_For_CCB_2G"3⤵
- Launches sc.exe
PID:544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C C:\Windows\system32\sc.exe delete "HDZB_DeviceService_For_CCB_2G"2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe delete "HDZB_DeviceService_For_CCB_2G"3⤵
- Launches sc.exe
PID:1620
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eee35c279c3acac6c9877d06e0dcc8e5
SHA1fca6bb9d39e8de1ee76fad58f50d3038f36c9b0e
SHA25616800b729f972683b33760ab7511b87eb48fcf497c63d2162c763b1e1936a302
SHA512029c62c599214da7b057b4bb0a6df7f8e37b8408a305d5599010bf18d91e3d6179bd4ca791a19c3255648c321a47ea14e4977c1ce9ae82e0d9a91a5844ce9d7d
-
Filesize
41KB
MD5ec95edf0ce02afd9511b14ad87bd9844
SHA183b99d5652df23f4ed42603604f9f8108eec4072
SHA256062bb420e8a0b7d8fd34dfc345148c925681ad483d137884f4fdffb1d394ff01
SHA512dc1e0e6e45342232b513d53cde4fcc8845dd55e216430bca7e76bb7eacbc0a06c90ddf7b4f250afc7fbf750c9ea3241ff0bbd8c36d9521a76348288e96b829b5
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
6KB
MD508e9796ca20c5fc5076e3ac05fb5709a
SHA107971d52dcbaa1054060073571ced046347177f7
SHA2568165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
SHA51202618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
41KB
MD5ec95edf0ce02afd9511b14ad87bd9844
SHA183b99d5652df23f4ed42603604f9f8108eec4072
SHA256062bb420e8a0b7d8fd34dfc345148c925681ad483d137884f4fdffb1d394ff01
SHA512dc1e0e6e45342232b513d53cde4fcc8845dd55e216430bca7e76bb7eacbc0a06c90ddf7b4f250afc7fbf750c9ea3241ff0bbd8c36d9521a76348288e96b829b5
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
6KB
MD508e9796ca20c5fc5076e3ac05fb5709a
SHA107971d52dcbaa1054060073571ced046347177f7
SHA2568165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
SHA51202618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4
-
Filesize
6KB
MD508e9796ca20c5fc5076e3ac05fb5709a
SHA107971d52dcbaa1054060073571ced046347177f7
SHA2568165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
SHA51202618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7