Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30/03/2023, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe
Resource
win10v2004-20230220-en
General
-
Target
3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe
-
Size
1.0MB
-
MD5
bdf9ce98f93ab89108e81c4ed95cbe10
-
SHA1
916029393630be5642e8d28735eef66ab9a98184
-
SHA256
3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d
-
SHA512
9751ed0b15a99a6cd25007db86e74ac8076ed3467c6fa8cbc1a2486e2c70c718af8f6ce0bc24b9abff8cd421001bfd38c6ba51b15848d73644b591a23a4e8398
-
SSDEEP
24576:l0a5zWc7x4TyjheHod9XxeDNmRJLduNtjKaDaxSEFJ0:lucGujPeDN4pu/2XxSEFy
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\CCB_HDZB_2G_P11.dll 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe File created C:\Windows\SysWOW64\CCB_HDZB_2G_P11.dll 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\CCBComponents\HDZB\log\20230330.log 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe File created C:\Program Files (x86)\CCBComponents\Plugins\npHDZB2gCertCtrl.dll 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe File created C:\Program Files (x86)\CCBComponents\Plugins\npHDZB2gSNCtrl.dll 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe File created C:\Program Files (x86)\CCBComponents\Plugins\CARoot\Cert_HDZB_2G_Firefox.exe 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1760 wrote to memory of 676 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 28 PID 1760 wrote to memory of 676 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 28 PID 1760 wrote to memory of 676 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 28 PID 1760 wrote to memory of 676 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 28 PID 676 wrote to memory of 596 676 cmd.exe 30 PID 676 wrote to memory of 596 676 cmd.exe 30 PID 676 wrote to memory of 596 676 cmd.exe 30 PID 676 wrote to memory of 596 676 cmd.exe 30 PID 596 wrote to memory of 1164 596 net.exe 31 PID 596 wrote to memory of 1164 596 net.exe 31 PID 596 wrote to memory of 1164 596 net.exe 31 PID 596 wrote to memory of 1164 596 net.exe 31 PID 1760 wrote to memory of 520 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 32 PID 1760 wrote to memory of 520 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 32 PID 1760 wrote to memory of 520 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 32 PID 1760 wrote to memory of 520 1760 3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe"C:\Users\Admin\AppData\Local\Temp\3230f4c7ebc1bd924e850aa022e4a356afed8a315311b0f6db0e8d51fa82ff9d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.execmd /C C:\Windows\system32\net.exe STOP "HDZB_DeviceService_For_CCB_2G"2⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe STOP "HDZB_DeviceService_For_CCB_2G"3⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "HDZB_DeviceService_For_CCB_2G"4⤵PID:1164
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "C:\Program Files (x86)\CCBComponents\HDZB\CCB_HDZB_2G_DeviceService.exe" /uninstall2⤵PID:520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5087f62fed7189687cfe04107ae68f176
SHA1c6cd888473e92066498d7b1c6464269d2ef6e51e
SHA256ccde92e590b9a4c15bc65f6accd4c6ba75b278d18d3870f2e7a0cd1e5d0d728e
SHA51273ee0b80f34d3d6c9fc6717d0ead6d1a6a210432c93d2b4a6e6398fc47cfc66a7f220c68c231b7468fb2b07342617aa0995df63ebd1e7cfed5ebe8c12a321eb3
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
6KB
MD508e9796ca20c5fc5076e3ac05fb5709a
SHA107971d52dcbaa1054060073571ced046347177f7
SHA2568165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
SHA51202618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
6KB
MD508e9796ca20c5fc5076e3ac05fb5709a
SHA107971d52dcbaa1054060073571ced046347177f7
SHA2568165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
SHA51202618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4
-
Filesize
6KB
MD508e9796ca20c5fc5076e3ac05fb5709a
SHA107971d52dcbaa1054060073571ced046347177f7
SHA2568165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
SHA51202618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7