Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/04/2024, 14:03

General

  • Target

    PCWProtectorSetup_Voice_Service.exe

  • Size

    4.4MB

  • MD5

    f14cc766cc424af695d5a22cf4603b00

  • SHA1

    c305a43566ccc3427207c47f15ea348fb042ca60

  • SHA256

    1e679e36e89a01b3c78d9e29600350d92469bded84088b4d00df2b70d50386f7

  • SHA512

    bd7a7dbbb0e21c8893e968a5caa0390951e00281a7670f5d226cb8417b515e581d4726e61e36a39a83cdff4942204c96c57bdd7e5c11d50c178831ac63113739

  • SSDEEP

    98304:gXr7+/ec6Mz2O1dXd8QDCoqF4AbrvQdw+bUiCMNjkTntdIhR3:gb769z2+dXdJ93q+bUi9ekT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 45 IoCs
  • Registers COM server for autorun 1 TTPs 5 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Windows directory 38 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PCWProtectorSetup_Voice_Service.exe
    "C:\Users\Admin\AppData\Local\Temp\PCWProtectorSetup_Voice_Service.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\Protect\PCWUpdater64.exe
      C:\Windows\Protect\PCWUpdater64.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2208
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s "C:\Windows\Protect\PCW.ocx"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s "C:\Windows\Protect\PCW64.ocx"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Windows\Protect\PCW64.ocx"
        3⤵
        • Loads dropped DLL
        • Registers COM server for autorun
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:488
  • C:\Windows\Protect\PCWProtectorService64.exe
    C:\Windows\Protect\PCWProtectorService64.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\Protect\PCWProtectorDummy64.exe
      C:\Windows\Protect\PCWProtectorDummy64.exe 1
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\Protect\PCWProtector.exe
        C:\Windows\Protect\PCWProtector.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsi32F3.tmp\PCWProtector.log

    Filesize

    37B

    MD5

    fe66a57578e17ad360ab1a5ee9508730

    SHA1

    e3a6c924df65990dcf271caa04cf82746a30f07a

    SHA256

    226ca4ce9e25d28d691c3430a706d9a20095aec6a2b479167a29ca2dbdceb621

    SHA512

    634becc06bbb328c85d0ae34416f754f0d7ac324311a2c833fa4d9f55810749d7786ec5d60e5627425372f412f1d805eede882198569dd9eddd29e45476017af

  • C:\Users\Admin\AppData\Local\Temp\nsi32F3.tmp\ioSpecial.ini

    Filesize

    526B

    MD5

    f57894c1b1d065f4e2489f94358c34c1

    SHA1

    96604c6f280aa74b3ff6a582df5d1299e75ec8b8

    SHA256

    cdc083a38e4ebc66e96af9253cfad7f5cf0458a94b9286d98637c9f6c4417b82

    SHA512

    b513437b8f726d45d9da284017d1c78601907c1488c9f3917379e3212c5342c21b134e49bedd63e1905f98447204b42eab7a03719694b3042c7c7c205edf9ef3

  • C:\Windows\Protect\PCW.ocx

    Filesize

    399KB

    MD5

    074b45a78113cf096d43187a5d38bbb6

    SHA1

    d31653a23df8e96c1f3f0f46a6178e8c3b05dcb5

    SHA256

    0b26f0cdc7dedcda0668ba6628aa9d3774ed5c97c7801c18b582cf4f43367f7c

    SHA512

    725755591e127e809be2aa7b3262178328257ff49f7666cb1005cdecb56b37936ca9b5cf83c3c343851f8c0063664def10efd9b183d94e78fcbbf46945e66c89

  • C:\Windows\Protect\PCWProtector.log

    Filesize

    1KB

    MD5

    79889d8b2f3f213ae3fcacde0777e39c

    SHA1

    d28dc668cead61e1f813242786504919846b1df9

    SHA256

    55a5b48b6a52e354c52a48840cf687cd2676dfe2f90a13932643b39fb8b17f02

    SHA512

    dcdfcc5c4cccbd04833ad17578f131d3a206b21efa5e5689955eb16fb76ddd3f2aac516d12605004fedc1f274a0cd154fb076e13ad336703cf9f064c39da75d1

  • C:\Windows\Protect\PCWProtector.log

    Filesize

    1KB

    MD5

    ed251bf35c85e59f3f69bc19885d83e0

    SHA1

    b60e8d887d3fd280b365bbcf3716402db257ee6a

    SHA256

    e6247b3da919fd630ff7522a1e3b8d8a34a2f100eac42bbf1750453418858ed2

    SHA512

    eaf93fc37a740ed3775bbf0036c00b1d4e57e4c9af8275d38aea9b0ccf453cade3cae435f3678b92707a6cfe7f5e33ad2a86423c7b1058091be5a3c04cf49873

  • C:\Windows\Protect\PCWProtector.log

    Filesize

    197B

    MD5

    967654fa22842b86c5ba96686fb3f99d

    SHA1

    47bcade1037256fbf60cb6a95d13a414a9d19759

    SHA256

    3e798f7cd67afd15fce592ffecd4bb635fb2671e861e98c56b977cf71ebd52be

    SHA512

    bf6dbc5cd4228605a0953ec9dc4062dcc02e89fb5d896f6ca6af430e177c777b050b61d3b84c2f0e28c15057005b14d1cb5caeba355183f780d6c96a5e034fdf

  • C:\Windows\Protect\PCWProtector.log

    Filesize

    875B

    MD5

    e1aaa7d034e3c7ec482468615c73d171

    SHA1

    b4fb447a4b091284995d462d33e99b9132ebd555

    SHA256

    982685e819c40f795be58a87b288f1d2b339039756932c3ef342924050909dcb

    SHA512

    c1e054014adc1024ebc9f2d55239dd633597ac8ce011127a61452f164e205ac4823621a2b56a59a32b92da84a53af6aaff7970b33449d6384c009fedc9cd8e6b

  • C:\Windows\Protect\PCWProtectorB.exe

    Filesize

    567KB

    MD5

    6ce74b64aee3c89d3939bb15ecfe7888

    SHA1

    58ec5c6b43b90aaa6fa7919c1dbf46812378efae

    SHA256

    ccb0bd5f3e296c35b38348cf4f231f93ce9bb57af42c328b0aba9e29103ee391

    SHA512

    f39486655c3d58a62d5c310ce181da0f7dee61e2d3179571b6c1e25ceba3b20c9061565708b8e7c5c5232ca3210348ed82305a105b3b678fadef7b62a2be8c64

  • C:\Windows\Protect\PCWProtectorDummy64.exe

    Filesize

    501KB

    MD5

    4e4009a8838142a76a1d3b7e9a72b0a2

    SHA1

    fce0ef120d20a322afbc0a0e8c942c69f2218e85

    SHA256

    3668f959946e719f5a72cc7c5311adf9e8dc5a13d94ca6e0b994d3a520adf881

    SHA512

    186de07c13518bbffc8eae9857228a4b51080fe409cd7499d9a9c1575a9cd2229c1d20418f121380e7b730ea9404595070b1b4f7ad55354472a9de49ac5a2d17

  • C:\Windows\Protect\PCWProtectorService64B.exe

    Filesize

    287KB

    MD5

    eb2aa21de1026a8a831af0797aac9a78

    SHA1

    0e5e03f209a50a46ac14246ae46ef19ee14d7233

    SHA256

    82c4c819c4d543f6131cbc462206e9cdaf4931abe6f73c21b6df4968897572a2

    SHA512

    89758110eef34b9c08b09cfb10569b0ce4b16788dc68029c12fda84859240d514d2a41827a61e99b9e2a8f1be1ce251a2fd8aeba990dfbb176158f6096ad11e2

  • C:\Windows\Protect\RdUtil.dll

    Filesize

    274KB

    MD5

    47c45dc36bbf3c5e6130dcfe37c89347

    SHA1

    5098af2483b5e2edf205bca47d43b086ddfd8d9d

    SHA256

    6f149b8ff0e97d0d2dcae5a952e6bdbc6222116eb2f865c7129f32f3fd3c5fa2

    SHA512

    f99724202d538a554c1bc591f7d50fe3362f42b66d243b8875a4f5d9cece8b817b6d8db35c35a2016b3268be1d0f92fff12127d1ef91be784b563a88e9902c41

  • C:\Windows\Protect\TDCommonLib64up.dll

    Filesize

    249KB

    MD5

    0e00def51125c6b54261001e3bacc19d

    SHA1

    a361eae15275148b77f8e168bba93e05bb04abe4

    SHA256

    b5945295ba8cb45903c77057b13d09c80dbd6a31eb64cff1d3a7d486e02d57a1

    SHA512

    597b83237db5677044ede9eb71e984bc5347e64ab86780707942a8375e4a7fb700e387f10f4dbf392367bdd7ce2ce79db0877f8422ff59e79f046691cdb52aca

  • C:\Windows\Protect\TDCommonLibup.dll

    Filesize

    212KB

    MD5

    ac67f6efefd9227789aefa657264508b

    SHA1

    007b50e73b92d34d3f19b96ffbf64f9289f1d4d8

    SHA256

    35a1fe7507c35696348fb28c6f3cb5e9c2fe1a8a6966b0a0b8fd469e521f384d

    SHA512

    af070714a26ccd462933ffc94f8634de8e6e2da57aebf2155444413ae05741e0b6e964a539bb79db893dd75d42339e7f8c2f450c8dc7800fc830f1f606c88f0d

  • C:\Windows\Protect\TDepend64up.exe

    Filesize

    490KB

    MD5

    b48cdc4af3bda1f3c5fc02deb759cfa2

    SHA1

    a007d162d5de321cfe7504c4d5212dc139f54fb0

    SHA256

    dfabe6784c2ab53bac3e579853449a3f57e291dd16af2fc56ebb84a56e8853aa

    SHA512

    33cc0c7336b8651005cebd466795d90a4a66720267756652c347593868f13fb59d601c46353d714f50fb5f47c21f1c107ca3212f42f743fe725d128e8f3a0496

  • C:\Windows\Protect\TDependup.exe

    Filesize

    387KB

    MD5

    6581da8becde34bd00604ae3a34fdf22

    SHA1

    310597bc32305530b9864ad517cdab915bb8310e

    SHA256

    a46584ab1229da1cf3b16a47e90a651b5d385e5b1c7b61d63e27d0b89148687a

    SHA512

    6e6e0478075639ebd105c3f8201646c5728be724311ee02500ccf0295e042b57ae072a2e694be5820df44aa47466f687960056ad8bb93e060301ba4f61be0264

  • C:\Windows\Protect\T_Prevent64up.dll

    Filesize

    309KB

    MD5

    d85f0082a012d73167921468731d1503

    SHA1

    43e6814e086b8385a3c03fc16526ab39adb7983a

    SHA256

    85235decb50cb8075a305d42809eb76f2237368d7e8155bc01cb8037c9caa18c

    SHA512

    3dbf52b866514c0b86fcc5752fc136d71bb4a802342801d64fe0127dfffcb6b8437e89d17fa81489c7cfcddf1c97908f1e1cdeeda67b0a1aabc48e8c78376849

  • C:\Windows\Protect\T_Preventup.dll

    Filesize

    258KB

    MD5

    c84ed9fe6e818185b971a6d10f0c16b7

    SHA1

    95daabafe876ebea94b24f8389ca6b0c8330e4af

    SHA256

    2a3324961c95098164646161108231510135f461d73e8ff07a1ee1216fff286f

    SHA512

    f1ffbeb198d3974afc03a4c5ca466cfb325db305e6bcb48852816e2bb1a516c441ece2bd74aaecce1e2597d59219e2b2e60c880bf2a98d7634138257ac90d3d4

  • C:\Windows\Protect\TftLib64up.dll

    Filesize

    303KB

    MD5

    69848fcf204e88745974c7650c4cb133

    SHA1

    cabb555c3bd71277e61eb5578267e359fd4b0809

    SHA256

    4cbec29c1857389174f7cd2e52d09b18307f1f58e8587c5102b12ea827a08423

    SHA512

    26086752234fdc212155620adf50ac6853b4b0515b5bd861a07bbf0eb6eff93c1838fc2911a471912f28195355438198c28eb0d9cef51774e010b79fda4627a2

  • C:\Windows\Protect\TftLibup.dll

    Filesize

    254KB

    MD5

    7bc750a3e94403913851e41f1028a832

    SHA1

    d035d67133c760b48522713bd3158ec2bf17fcbc

    SHA256

    64aaa65abb2d5cfd49c96d349dec267e904457ec70c91fa64d0ee60b0b155817

    SHA512

    8de51b3bb24cedf37a8a138f5c6177d3f8ad3602b81d387a129b2a7662c53ffe91afbba09b9f26844de535bab29ade8da7e25621efbc032e903882dda3974d61

  • C:\Windows\Protect\WMlogo.bmp

    Filesize

    210KB

    MD5

    dc27cb08c2e57eb137797d6ceab3f23c

    SHA1

    0caac5731c117db54d0e5fdb554b5a5c5d1f7d22

    SHA256

    07b7953d1a9b2fac4f4208649ed18ac1cffdca7f68ccbf1373d0e5120d837e95

    SHA512

    51618c56101d5a9fee1806a4ca08f31eaecbd80c53ec21628f297d6d651086384d8e2bdac054240870a2b66af6ee02b3697bcf2df4af059132e495d1295cc4da

  • \Users\Admin\AppData\Local\Temp\nsi32F3.tmp\PCWPlugin.dll

    Filesize

    262KB

    MD5

    8240bee02c3ad64fe256a67479de886c

    SHA1

    afb6f7fede3ef1509b1be979dd3ca1ce5ea03db6

    SHA256

    d0a7db3315f28a3b1016b21a78d30b71d961b5979d50635c716df5c11fd1351e

    SHA512

    34170981f78f77814c6869f3833631726c869ddab28827260d3a9ab9fd9b899414f53a7c94517cf25afebb883e2638190c1b396259fead3cb3dc1f123b94ad33

  • \Users\Admin\AppData\Local\Temp\nsi32F3.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsi32F3.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Windows\Protect\PCW64.ocx

    Filesize

    524KB

    MD5

    61b0ff9ac09a1da24fc7c08d22f5a33d

    SHA1

    9a3411af07a241d6a5fd482d3ade8d7872944d60

    SHA256

    68ab12650aaefa3933928ac44ab01451c8923dfdf10b309c5723affe2c946550

    SHA512

    2d954b764c9e793f203a07a20df6fb7fe0044652ffe61053d55872c2763708039514ee2cc13fa67bf9070d2ab93b54227681e86f663a9f4df5f711d89f4045ef

  • \Windows\Protect\PCWUpdater64.exe

    Filesize

    520KB

    MD5

    506ce3ed7e4ee4d42c05482ebd9e230f

    SHA1

    4eb0d15002fad41803818600aa24002581b40bfa

    SHA256

    29ecf971c9d8b5301171b6f786164a1cea29fbf27e20949635e4b95307b2880b

    SHA512

    1997a7406afee2c460200addd76aca44478df66a5f5e16d153d4ff6e4e9e2b83fca12f338b4c6a55dfad843dfae243d005d7ef1f3870b376cfe8b21ff83dd74c

  • memory/2320-123-0x00000000021A0000-0x00000000021DE000-memory.dmp

    Filesize

    248KB

  • memory/2488-130-0x0000000000960000-0x00000000009AA000-memory.dmp

    Filesize

    296KB