Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
0c2c7664a605d6f9a5718b4b8f4f5178.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c2c7664a605d6f9a5718b4b8f4f5178.exe
Resource
win10v2004-20231215-en
General
-
Target
0c2c7664a605d6f9a5718b4b8f4f5178.exe
-
Size
458KB
-
MD5
0c2c7664a605d6f9a5718b4b8f4f5178
-
SHA1
3ed9b5119fe3ca8458fcdef3e346a0ab0f796481
-
SHA256
0acde791416ef240fc145106f6ff6f2840a0d7b99a30102d95dc663c835f5c0a
-
SHA512
4df3ebcbc7fa7c14a3b8d9792986d4516d26d3b95470a6382509fb83d516473eaafd4d686c3937abbd7bb88a170ef490048ebf4ed6825617c974c7dc81a74c09
-
SSDEEP
12288:m5FYuRsEPTjn0nLxgeQOeuEgNtTirdmPq:mQ+sErj0nLGuzTEdmy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1904 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2632 systemcc -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0c2c7664a605d6f9a5718b4b8f4f5178.exe File opened for modification \??\PhysicalDrive0 systemcc -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\systemcc 0c2c7664a605d6f9a5718b4b8f4f5178.exe File created C:\Windows\uninstal.BAT 0c2c7664a605d6f9a5718b4b8f4f5178.exe File created C:\Windows\systemcc 0c2c7664a605d6f9a5718b4b8f4f5178.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2072 0c2c7664a605d6f9a5718b4b8f4f5178.exe Token: SeDebugPrivilege 2632 systemcc -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 systemcc -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2888 2632 systemcc 29 PID 2632 wrote to memory of 2888 2632 systemcc 29 PID 2632 wrote to memory of 2888 2632 systemcc 29 PID 2632 wrote to memory of 2888 2632 systemcc 29 PID 2072 wrote to memory of 1904 2072 0c2c7664a605d6f9a5718b4b8f4f5178.exe 30 PID 2072 wrote to memory of 1904 2072 0c2c7664a605d6f9a5718b4b8f4f5178.exe 30 PID 2072 wrote to memory of 1904 2072 0c2c7664a605d6f9a5718b4b8f4f5178.exe 30 PID 2072 wrote to memory of 1904 2072 0c2c7664a605d6f9a5718b4b8f4f5178.exe 30 PID 2072 wrote to memory of 1904 2072 0c2c7664a605d6f9a5718b4b8f4f5178.exe 30 PID 2072 wrote to memory of 1904 2072 0c2c7664a605d6f9a5718b4b8f4f5178.exe 30 PID 2072 wrote to memory of 1904 2072 0c2c7664a605d6f9a5718b4b8f4f5178.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c2c7664a605d6f9a5718b4b8f4f5178.exe"C:\Users\Admin\AppData\Local\Temp\0c2c7664a605d6f9a5718b4b8f4f5178.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.BAT2⤵
- Deletes itself
PID:1904
-
-
C:\Windows\systemccC:\Windows\systemcc1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files\Internet Explorer\iEXpLOrE.exE"C:\Program Files\Internet Explorer\iEXpLOrE.exE"2⤵PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD50c2c7664a605d6f9a5718b4b8f4f5178
SHA13ed9b5119fe3ca8458fcdef3e346a0ab0f796481
SHA2560acde791416ef240fc145106f6ff6f2840a0d7b99a30102d95dc663c835f5c0a
SHA5124df3ebcbc7fa7c14a3b8d9792986d4516d26d3b95470a6382509fb83d516473eaafd4d686c3937abbd7bb88a170ef490048ebf4ed6825617c974c7dc81a74c09
-
Filesize
190B
MD53b6b38c88e2925d5c6484be815b9652a
SHA1d2095c43f40f3c3ce6a79dc1c6d6fcf27c313bbe
SHA256a3d86dc8adfe1037ab46a2a7ae4e8729f3181860c31f077600eff35901235a5f
SHA5125385565c67405890afccd586b32eb4980e4f936898d202a6073e8b861fce5abb9787d05588aa9d70768921a21c3791fd5349cb31549c2fa109fae0c9d413db35