Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
Patch_CNN.CLI.CL.23.00.00.10.exe
Resource
win7-20231215-en
General
-
Target
Patch_CNN.CLI.CL.23.00.00.10.exe
-
Size
17.7MB
-
MD5
374dfab5c8575d386382466bb2caf3e7
-
SHA1
a392b2e05fc6506fff64a2f4a682ded88d13d289
-
SHA256
ce461afb0e0a2383774adc783957d15f30711dcfba83e5fc801cb26385db0f09
-
SHA512
8bf0f3c0198f4d34faa0a29069b10a309e6ee1c8d86214053d7af3f966b19a96df7c09bb6f15ddbbdf9166ccfc8de5b3fde7c07a74d72f008073a8261c15f754
-
SSDEEP
393216:bBJ5NtmBK2gqybV/4w6WtJqTb/JvQaw2OC/xp1w7AdeYq+y+88ssfFPxyV8:rcBFgqybVwwttGD/OC/xMcAuy+889tPX
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Patch_CNN.CLI.CL.23.00.00.10.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Patch_CNN.CLI.CL.23.00.00.10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Patch_CNN.CLI.CL.23.00.00.10.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Wine Patch_CNN.CLI.CL.23.00.00.10.exe -
Loads dropped DLL 1 IoCs
pid Process 4588 Patch_CNN.CLI.CL.23.00.00.10.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Patch_CNN.CLI.CL.23.00.00.10.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4588 Patch_CNN.CLI.CL.23.00.00.10.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Bentley Shared\CONNECTION Client\Bentley.Connect.Client.Framework.dll Patch_CNN.CLI.CL.23.00.00.10.exe File created C:\Program Files\Common Files\Bentley Shared\CONNECTION Client\LicService\Bentley.Licensing.CloudServices.Authentication.Client.dll Patch_CNN.CLI.CL.23.00.00.10.exe File opened for modification C:\Program Files\Common Files\Bentley Shared\CONNECTION Client\LicService\Bentley.Licensing.CloudServices.Authentication.Client.dll Patch_CNN.CLI.CL.23.00.00.10.exe File created C:\Program Files\Common Files\Bentley Shared\CONNECTION Client\LicService\Bentley.Licensing.LicenseManagement.dll Patch_CNN.CLI.CL.23.00.00.10.exe File opened for modification C:\Program Files\Common Files\Bentley Shared\CONNECTION Client\LicService\Bentley.Licensing.LicenseManagement.dll Patch_CNN.CLI.CL.23.00.00.10.exe File created C:\Program Files\Common Files\Bentley Shared\CONNECTION Client\Bentley.Connect.Client.Framework.dll Patch_CNN.CLI.CL.23.00.00.10.exe -
Kills process with taskkill 2 IoCs
pid Process 3628 taskkill.exe 4076 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 5052 PING.EXE 4648 PING.EXE 4420 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4588 Patch_CNN.CLI.CL.23.00.00.10.exe 4588 Patch_CNN.CLI.CL.23.00.00.10.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3628 taskkill.exe Token: SeDebugPrivilege 4076 taskkill.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2620 4588 Patch_CNN.CLI.CL.23.00.00.10.exe 103 PID 4588 wrote to memory of 2620 4588 Patch_CNN.CLI.CL.23.00.00.10.exe 103 PID 4588 wrote to memory of 2620 4588 Patch_CNN.CLI.CL.23.00.00.10.exe 103 PID 2620 wrote to memory of 4072 2620 cmd.exe 105 PID 2620 wrote to memory of 4072 2620 cmd.exe 105 PID 2620 wrote to memory of 4072 2620 cmd.exe 105 PID 2620 wrote to memory of 3048 2620 cmd.exe 106 PID 2620 wrote to memory of 3048 2620 cmd.exe 106 PID 2620 wrote to memory of 3048 2620 cmd.exe 106 PID 3048 wrote to memory of 4040 3048 net.exe 107 PID 3048 wrote to memory of 4040 3048 net.exe 107 PID 3048 wrote to memory of 4040 3048 net.exe 107 PID 2620 wrote to memory of 3628 2620 cmd.exe 108 PID 2620 wrote to memory of 3628 2620 cmd.exe 108 PID 2620 wrote to memory of 3628 2620 cmd.exe 108 PID 2620 wrote to memory of 4076 2620 cmd.exe 109 PID 2620 wrote to memory of 4076 2620 cmd.exe 109 PID 2620 wrote to memory of 4076 2620 cmd.exe 109 PID 2620 wrote to memory of 4648 2620 cmd.exe 110 PID 2620 wrote to memory of 4648 2620 cmd.exe 110 PID 2620 wrote to memory of 4648 2620 cmd.exe 110 PID 2620 wrote to memory of 4420 2620 cmd.exe 111 PID 2620 wrote to memory of 4420 2620 cmd.exe 111 PID 2620 wrote to memory of 4420 2620 cmd.exe 111 PID 2620 wrote to memory of 5052 2620 cmd.exe 112 PID 2620 wrote to memory of 5052 2620 cmd.exe 112 PID 2620 wrote to memory of 5052 2620 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\Patch_CNN.CLI.CL.23.00.00.10.exe"C:\Users\Admin\AppData\Local\Temp\Patch_CNN.CLI.CL.23.00.00.10.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\scc.cmd"2⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\mode.commode CON: COLS=84 LINES=53⤵PID:4072
-
-
C:\Windows\SysWOW64\net.exeNET FILE3⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 FILE4⤵PID:4040
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Bentley.Licensing.Service.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Bentley.Connect.Client.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 -w 1 127.0.0.13⤵
- Runs ping.exe
PID:4648
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 -w 1 127.0.0.13⤵
- Runs ping.exe
PID:4420
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 -w 1 127.0.0.13⤵
- Runs ping.exe
PID:5052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.8MB
MD5d7168ab72d50982859dbab6782488c8f
SHA1e01ad884935f1ec4963025e4f5688b3d1e3d0728
SHA256116016985a4004050ea6c2cb7987598a952cd128ed5709bd252942022c209065
SHA512e84e9a17e8ae5fad59cb05b788bf4ecfe1d0180950cd29245f88482704ebb8acf3240e6a4bfd6de78ba5c56145e5cb78ef730f5646e8e434b378d68cd60ffb3d
-
Filesize
2KB
MD52d183c3162cfda28310d6d68dfeac40d
SHA1490a0766cba46f4e70a6b161540681cfb4cc28b2
SHA256059cc52b0f09294c0473fbd4e0b0c05cc4166d5aaa1218efe56d24ff0fa24eed
SHA51257f05dbf7b39a1f7423f7c1824dd9a85b0edf313692bd3871da625b3b1d4d1b5689e0ec2c315ca51d8f82720024186749b5f1317a61ed84721bb38705a2888aa