Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe
Resource
win10v2004-20231215-en
General
-
Target
0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe
-
Size
15.0MB
-
MD5
0bc1320cc6400eb3d0ef6e0ffd52ad9e
-
SHA1
e507245cc7fae623067823c1e32c3059e68ba267
-
SHA256
dcc331955bb4aee347e5702cd4311e66266c4bdf2d7e75eaaecec72ff45eaeb5
-
SHA512
395e3938389375b5a171df71980aa5853ddd662147692a4765f24ccc1d6d9296e6f53d338ce75e045a7bf79ef6c3df8beb77fca32a3f39b141afafe889f9a68a
-
SSDEEP
24576:CerU5sWbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbH:CsW
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\rhwusxcg = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1860 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\rhwusxcg\ImagePath = "C:\\Windows\\SysWOW64\\rhwusxcg\\jetdinfd.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2600 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2864 jetdinfd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2864 set thread context of 2600 2864 jetdinfd.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1764 sc.exe 2800 sc.exe 2648 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2384 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 28 PID 2296 wrote to memory of 2384 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 28 PID 2296 wrote to memory of 2384 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 28 PID 2296 wrote to memory of 2384 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 28 PID 2296 wrote to memory of 2756 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 30 PID 2296 wrote to memory of 2756 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 30 PID 2296 wrote to memory of 2756 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 30 PID 2296 wrote to memory of 2756 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 30 PID 2296 wrote to memory of 2648 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 32 PID 2296 wrote to memory of 2648 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 32 PID 2296 wrote to memory of 2648 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 32 PID 2296 wrote to memory of 2648 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 32 PID 2296 wrote to memory of 1764 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 34 PID 2296 wrote to memory of 1764 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 34 PID 2296 wrote to memory of 1764 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 34 PID 2296 wrote to memory of 1764 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 34 PID 2296 wrote to memory of 2800 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 36 PID 2296 wrote to memory of 2800 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 36 PID 2296 wrote to memory of 2800 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 36 PID 2296 wrote to memory of 2800 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 36 PID 2296 wrote to memory of 1860 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 39 PID 2296 wrote to memory of 1860 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 39 PID 2296 wrote to memory of 1860 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 39 PID 2296 wrote to memory of 1860 2296 0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe 39 PID 2864 wrote to memory of 2600 2864 jetdinfd.exe 41 PID 2864 wrote to memory of 2600 2864 jetdinfd.exe 41 PID 2864 wrote to memory of 2600 2864 jetdinfd.exe 41 PID 2864 wrote to memory of 2600 2864 jetdinfd.exe 41 PID 2864 wrote to memory of 2600 2864 jetdinfd.exe 41 PID 2864 wrote to memory of 2600 2864 jetdinfd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe"C:\Users\Admin\AppData\Local\Temp\0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\rhwusxcg\2⤵PID:2384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jetdinfd.exe" C:\Windows\SysWOW64\rhwusxcg\2⤵PID:2756
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create rhwusxcg binPath= "C:\Windows\SysWOW64\rhwusxcg\jetdinfd.exe /d\"C:\Users\Admin\AppData\Local\Temp\0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2648
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description rhwusxcg "wifi internet conection"2⤵
- Launches sc.exe
PID:1764
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start rhwusxcg2⤵
- Launches sc.exe
PID:2800
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1860
-
-
C:\Windows\SysWOW64\rhwusxcg\jetdinfd.exeC:\Windows\SysWOW64\rhwusxcg\jetdinfd.exe /d"C:\Users\Admin\AppData\Local\Temp\0bc1320cc6400eb3d0ef6e0ffd52ad9e.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD524b770031d80e5482bc2c4d6e0bb447f
SHA1898eac7e1232ccb475b50374d0706ac036de29c1
SHA256eee0bb26d295b60d711ddbf71332b743dc72ff1387c8d56ff712ecf13a5c161e
SHA512bf003b54b05775723f4ec673e1d6ac3f6c15a7b863ed3b3266f4dca34794b7b38e18c4d1c8f3d9942b997cf7754072c50e2a8000bbe3361ac3ff88b129843087
-
Filesize
42KB
MD55d00245ecc14ba0ecce2e7eb79f5c717
SHA12826ca6ab308f2bbf283848f49e9257f88873521
SHA256b57d9d6a41c329cad76a6e6b26134d80b6877025b010464b70d388791126320c
SHA512bf68307eabc6e3ec633ba563815617419de333f5f9c25ebf22d5dbc74455bfe8e6774712bce433fa5e320ff13b539be21c9808ad9493352fba0ccbf7a9edf6e5