Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3ccsetup620.exe
windows7-x64
7ccsetup620.exe
windows10-2004-x64
6$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$_131_/lang-1025.dll
windows7-x64
1$_131_/lang-1025.dll
windows10-2004-x64
1$_131_/lang-1026.dll
windows7-x64
1$_131_/lang-1026.dll
windows10-2004-x64
1$_131_/lang-1027.dll
windows7-x64
1$_131_/lang-1027.dll
windows10-2004-x64
1$_131_/lang-1028.dll
windows7-x64
1$_131_/lang-1028.dll
windows10-2004-x64
1$_131_/lang-1029.dll
windows7-x64
1$_131_/lang-1029.dll
windows10-2004-x64
1$_131_/lang-1030.dll
windows7-x64
1$_131_/lang-1030.dll
windows10-2004-x64
1$_131_/lang-1031.dll
windows7-x64
1$_131_/lang-1031.dll
windows10-2004-x64
1$_131_/lang-1032.dll
windows7-x64
1$_131_/lang-1032.dll
windows10-2004-x64
1$_131_/lang-1034.dll
windows7-x64
1$_131_/lang-1034.dll
windows10-2004-x64
1$_131_/lang-1035.dll
windows7-x64
1$_131_/lang-1035.dll
windows10-2004-x64
1Resubmissions
18/01/2024, 10:46
240118-mt9wgaadd2 718/01/2024, 09:27
240118-le4v8shch2 718/01/2024, 09:17
240118-k9c6bshbh2 6Analysis
-
max time kernel
130s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
ccsetup620.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ccsetup620.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$_131_/lang-1025.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$_131_/lang-1025.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
$_131_/lang-1026.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$_131_/lang-1026.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$_131_/lang-1027.dll
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
$_131_/lang-1027.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
$_131_/lang-1028.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
$_131_/lang-1028.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
$_131_/lang-1029.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
$_131_/lang-1029.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
$_131_/lang-1030.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
$_131_/lang-1030.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
$_131_/lang-1031.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
$_131_/lang-1031.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
$_131_/lang-1032.dll
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
$_131_/lang-1032.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
$_131_/lang-1034.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
$_131_/lang-1034.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
$_131_/lang-1035.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
$_131_/lang-1035.dll
Resource
win10v2004-20231222-en
General
-
Target
ccsetup620.exe
-
Size
75.1MB
-
MD5
2252f06e55902cc69216d7ca4ced72f1
-
SHA1
217c9c78833299d89a4b133328290987955552e6
-
SHA256
2eea6ce78a42a5c07091a313cfdf13a083e46b493b6c2fb44bacf8626bf5d097
-
SHA512
e77d8d17cd0a1cf44ed0e49f3d6f275849e9545ae20778958dce6b6c67d8278a46f4f63c4f8d315af64bec0259b61aa0919d63620d4e877f95bea801fc0fa8fd
-
SSDEEP
1572864:D/rhQ11XtcajK3jlUZyAWAAqpModeSmyeiRCH5IdBTrtZfeKeA5Mics:DUc+6JoyArAEModdmyen5IdprtBeKe92
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ccsetup620.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Loads dropped DLL 9 IoCs
pid Process 4604 ccsetup620.exe 4604 ccsetup620.exe 4604 ccsetup620.exe 4604 ccsetup620.exe 4604 ccsetup620.exe 4604 ccsetup620.exe 4604 ccsetup620.exe 4604 ccsetup620.exe 4604 ccsetup620.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 ccsetup620.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ccsetup620.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz ccsetup620.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4604 ccsetup620.exe 4604 ccsetup620.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 4604 ccsetup620.exe Token: SeCreatePagefilePrivilege 4604 ccsetup620.exe Token: SeShutdownPrivilege 4604 ccsetup620.exe Token: SeCreatePagefilePrivilege 4604 ccsetup620.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4604 ccsetup620.exe 4604 ccsetup620.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccsetup620.exe"C:\Users\Admin\AppData\Local\Temp\ccsetup620.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
4KB
MD52f69afa9d17a5245ec9b5bb03d56f63c
SHA1e0a133222136b3d4783e965513a690c23826aec9
SHA256e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0
SHA512bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926
-
Filesize
1.0MB
MD5e3f60a2cf6b1d155f5f7d17615907013
SHA18191871854dcbcc4fe34218040215581b0fccf43
SHA25674fcd2367fb1d9c0084547ebaf1c6db081946453a5d0a2d668d83d3c489a60a9
SHA51220a57a1d2ce3d081958b4b3b48f1c902039f26dd28abcac94fad6f20e8e5d630bbfd2365eb7200f7c8d676c593cb3dc465a406e8536abdf63bd7ef76bb86df2b
-
Filesize
348KB
MD52973af8515effd0a3bfc7a43b03b3fcc
SHA14209cded0caac7c5cb07bcb29f1ee0dc5ac211ee
SHA256d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0
SHA512b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e
-
Filesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
Filesize
13.0MB
MD5c1b88b9e01cc1f2b859226a74e610ef7
SHA1313ab99181bc1e6b6bcee5750a4a698cf5d3c6d1
SHA2569b19980e7bc4bf623444f762b96d0e38777fbe916d9f722349d148fc715ebf63
SHA512f40bb7e86a5cbfa7a93b962e572c8a94816431e8527a92c46e3ada544d917cfb1ddcc2a865ee0526e312d1faaded2a4bc1f1b5a420ab03ad278186bfdad18656
-
Filesize
17.6MB
MD555f6c8356c5ab2aee987c9ac7dd4f455
SHA16cff47726704b674f9dfa3bbef390f0f074856ec
SHA256f7dbc940e1703483adf7c44df8f4e9b402743474ffbe491c5d0926e3a8723363
SHA51289424c3e9d107eb0ec6b1b771d5d3da9edbb2faae37f4b7f822190f315f514fbc026bd3f4c32d88924df9464a8e6a16b6193b03427ff32d6ecd59576143dab32
-
Filesize
2KB
MD5d32b0460183056d3056d6db89c992b88
SHA179823e151b3438ab8d273a6b4a3d56a9571379b4
SHA256b013039e32d2f8e54cfebdbfdabc25f21aa0bbe9ef26a2a5319a20024961e9a7
SHA5123ad36f9d4015f2d3d5bc15eac221a0ecef3fcb1ef4c3c87b97b3413a66faa445869e054f7252cc233cd2bf8f1aa75cb3351d2c70c8121f4850b3db29951bc817
-
Filesize
7KB
MD5a736159759a56c29575e49cb2a51f2b3
SHA1b1594bbca4358886d25c3a1bc662d87c913318cb
SHA25658e75de1789c90333daaf93176194d2a3d64f2eecdf57a4b9384a229e81f874f
SHA5124da523a36375b37fa7bc4b4ccf7c93e1df7b2da15152edf7d419927aa1bb271ef8ba27fe734d2f623fcc02b47319e75333df014bed01eb466e0cd9ec4111ef53
-
Filesize
87KB
MD57f4f45c9393a0664d9d0725a2ff42c6b
SHA1b7b30eb534e6dc69e8e293443c157134569e8ce7
SHA256dbd8b6fdb66604a0a5e8efe269fbfa598e4a94dc146006036409d905209da42b
SHA5120c27f9ce615cbff3e17fd772ce3929ab4419d7432d96223b7eec1ba70953f2ac993404b954020247b52d7f7499212d44eb6f85da2e2676773cafe1ce89b390f9