Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/01/2024, 10:46

240118-mt9wgaadd2 7

18/01/2024, 09:27

240118-le4v8shch2 7

18/01/2024, 09:17

240118-k9c6bshbh2 6

Analysis

  • max time kernel
    130s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 09:27

General

  • Target

    ccsetup620.exe

  • Size

    75.1MB

  • MD5

    2252f06e55902cc69216d7ca4ced72f1

  • SHA1

    217c9c78833299d89a4b133328290987955552e6

  • SHA256

    2eea6ce78a42a5c07091a313cfdf13a083e46b493b6c2fb44bacf8626bf5d097

  • SHA512

    e77d8d17cd0a1cf44ed0e49f3d6f275849e9545ae20778958dce6b6c67d8278a46f4f63c4f8d315af64bec0259b61aa0919d63620d4e877f95bea801fc0fa8fd

  • SSDEEP

    1572864:D/rhQ11XtcajK3jlUZyAWAAqpModeSmyeiRCH5IdBTrtZfeKeA5Mics:DUc+6JoyArAEModdmyen5IdprtBeKe92

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccsetup620.exe
    "C:\Users\Admin\AppData\Local\Temp\ccsetup620.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\System.dll

    Filesize

    12KB

    MD5

    cff85c549d536f651d4fb8387f1976f2

    SHA1

    d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

    SHA256

    8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

    SHA512

    531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    2f69afa9d17a5245ec9b5bb03d56f63c

    SHA1

    e0a133222136b3d4783e965513a690c23826aec9

    SHA256

    e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0

    SHA512

    bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\a\asdk.dll

    Filesize

    1.0MB

    MD5

    e3f60a2cf6b1d155f5f7d17615907013

    SHA1

    8191871854dcbcc4fe34218040215581b0fccf43

    SHA256

    74fcd2367fb1d9c0084547ebaf1c6db081946453a5d0a2d668d83d3c489a60a9

    SHA512

    20a57a1d2ce3d081958b4b3b48f1c902039f26dd28abcac94fad6f20e8e5d630bbfd2365eb7200f7c8d676c593cb3dc465a406e8536abdf63bd7ef76bb86df2b

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\g\gcapi_dll.dll

    Filesize

    348KB

    MD5

    2973af8515effd0a3bfc7a43b03b3fcc

    SHA1

    4209cded0caac7c5cb07bcb29f1ee0dc5ac211ee

    SHA256

    d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0

    SHA512

    b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    6c3f8c94d0727894d706940a8a980543

    SHA1

    0d1bcad901be377f38d579aafc0c41c0ef8dcefd

    SHA256

    56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2

    SHA512

    2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\p\pfBL.dll

    Filesize

    13.0MB

    MD5

    c1b88b9e01cc1f2b859226a74e610ef7

    SHA1

    313ab99181bc1e6b6bcee5750a4a698cf5d3c6d1

    SHA256

    9b19980e7bc4bf623444f762b96d0e38777fbe916d9f722349d148fc715ebf63

    SHA512

    f40bb7e86a5cbfa7a93b962e572c8a94816431e8527a92c46e3ada544d917cfb1ddcc2a865ee0526e312d1faaded2a4bc1f1b5a420ab03ad278186bfdad18656

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\ui\pfUI.dll

    Filesize

    17.6MB

    MD5

    55f6c8356c5ab2aee987c9ac7dd4f455

    SHA1

    6cff47726704b674f9dfa3bbef390f0f074856ec

    SHA256

    f7dbc940e1703483adf7c44df8f4e9b402743474ffbe491c5d0926e3a8723363

    SHA512

    89424c3e9d107eb0ec6b1b771d5d3da9edbb2faae37f4b7f822190f315f514fbc026bd3f4c32d88924df9464a8e6a16b6193b03427ff32d6ecd59576143dab32

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\ui\res\CC_Logo_40x96.png

    Filesize

    2KB

    MD5

    d32b0460183056d3056d6db89c992b88

    SHA1

    79823e151b3438ab8d273a6b4a3d56a9571379b4

    SHA256

    b013039e32d2f8e54cfebdbfdabc25f21aa0bbe9ef26a2a5319a20024961e9a7

    SHA512

    3ad36f9d4015f2d3d5bc15eac221a0ecef3fcb1ef4c3c87b97b3413a66faa445869e054f7252cc233cd2bf8f1aa75cb3351d2c70c8121f4850b3db29951bc817

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\ui\res\CC_logo_72x66.png

    Filesize

    7KB

    MD5

    a736159759a56c29575e49cb2a51f2b3

    SHA1

    b1594bbca4358886d25c3a1bc662d87c913318cb

    SHA256

    58e75de1789c90333daaf93176194d2a3d64f2eecdf57a4b9384a229e81f874f

    SHA512

    4da523a36375b37fa7bc4b4ccf7c93e1df7b2da15152edf7d419927aa1bb271ef8ba27fe734d2f623fcc02b47319e75333df014bed01eb466e0cd9ec4111ef53

  • C:\Users\Admin\AppData\Local\Temp\nsu6B0B.tmp\ui\res\PF_computer.png

    Filesize

    87KB

    MD5

    7f4f45c9393a0664d9d0725a2ff42c6b

    SHA1

    b7b30eb534e6dc69e8e293443c157134569e8ce7

    SHA256

    dbd8b6fdb66604a0a5e8efe269fbfa598e4a94dc146006036409d905209da42b

    SHA512

    0c27f9ce615cbff3e17fd772ce3929ab4419d7432d96223b7eec1ba70953f2ac993404b954020247b52d7f7499212d44eb6f85da2e2676773cafe1ce89b390f9