Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 08:32
Static task
static1
Behavioral task
behavioral1
Sample
0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe
Resource
win7-20240903-en
General
-
Target
0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe
-
Size
345KB
-
MD5
c9e80445f0a257960d42c65b5a4383b0
-
SHA1
3473ccc4a88c86af20a4a7d8747926f487dc5ee3
-
SHA256
0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384a
-
SHA512
5c4af77b3f8db27e41682ae955b67257cde878ba6d33c3f50743903a710f600129a85fa9ec13436630df00d1b78b498f923543dfcc933dcc244f0b1c5deb3348
-
SSDEEP
3072:Kg9OBT3Be2Q6khQiCCuefXxzk6iGcbPChEdGZFR2obD4CTvek5WNQp0qYutgxS9I:YeC4EwZFoobUk8qp0qpgogZfpjkNYLb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" scpbsg0q.bat Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" scpbsg0q.bat Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" scpbsg0q.bat Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation scpbsg0q.bat -
Executes dropped EXE 1 IoCs
pid Process 1604 scpbsg0q.bat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" scpbsg0q.bat -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api.ipify.org 20 api.ipify.org -
Launches sc.exe 16 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2940 sc.exe 1628 sc.exe 4876 sc.exe 4932 sc.exe 3660 sc.exe 1012 sc.exe 1364 sc.exe 2292 sc.exe 3544 sc.exe 4836 sc.exe 3836 sc.exe 3528 sc.exe 452 sc.exe 1756 sc.exe 1500 sc.exe 3460 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3412 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat 1604 scpbsg0q.bat -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe Token: SeDebugPrivilege 1604 scpbsg0q.bat Token: SeSecurityPrivilege 2512 wevtutil.exe Token: SeBackupPrivilege 2512 wevtutil.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 2320 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 452 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 82 PID 3096 wrote to memory of 452 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 82 PID 3096 wrote to memory of 4876 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 83 PID 3096 wrote to memory of 4876 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 83 PID 3096 wrote to memory of 3640 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 86 PID 3096 wrote to memory of 3640 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 86 PID 3096 wrote to memory of 2292 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 88 PID 3096 wrote to memory of 2292 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 88 PID 3640 wrote to memory of 4932 3640 cmd.exe 90 PID 3640 wrote to memory of 4932 3640 cmd.exe 90 PID 3096 wrote to memory of 1604 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 91 PID 3096 wrote to memory of 1604 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 91 PID 3096 wrote to memory of 2248 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 92 PID 3096 wrote to memory of 2248 3096 0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe 92 PID 1604 wrote to memory of 1012 1604 scpbsg0q.bat 94 PID 1604 wrote to memory of 1012 1604 scpbsg0q.bat 94 PID 1604 wrote to memory of 3660 1604 scpbsg0q.bat 95 PID 1604 wrote to memory of 3660 1604 scpbsg0q.bat 95 PID 2248 wrote to memory of 4680 2248 cmd.exe 98 PID 2248 wrote to memory of 4680 2248 cmd.exe 98 PID 2248 wrote to memory of 3144 2248 cmd.exe 99 PID 2248 wrote to memory of 3144 2248 cmd.exe 99 PID 2248 wrote to memory of 3412 2248 cmd.exe 100 PID 2248 wrote to memory of 3412 2248 cmd.exe 100 PID 1604 wrote to memory of 1100 1604 scpbsg0q.bat 101 PID 1604 wrote to memory of 1100 1604 scpbsg0q.bat 101 PID 1604 wrote to memory of 1756 1604 scpbsg0q.bat 103 PID 1604 wrote to memory of 1756 1604 scpbsg0q.bat 103 PID 1100 wrote to memory of 2940 1100 cmd.exe 105 PID 1100 wrote to memory of 2940 1100 cmd.exe 105 PID 1604 wrote to memory of 1776 1604 scpbsg0q.bat 107 PID 1604 wrote to memory of 1776 1604 scpbsg0q.bat 107 PID 1604 wrote to memory of 1500 1604 scpbsg0q.bat 109 PID 1604 wrote to memory of 1500 1604 scpbsg0q.bat 109 PID 1604 wrote to memory of 3444 1604 scpbsg0q.bat 111 PID 1604 wrote to memory of 3444 1604 scpbsg0q.bat 111 PID 1604 wrote to memory of 3544 1604 scpbsg0q.bat 113 PID 1604 wrote to memory of 3544 1604 scpbsg0q.bat 113 PID 2248 wrote to memory of 1236 2248 cmd.exe 115 PID 2248 wrote to memory of 1236 2248 cmd.exe 115 PID 2248 wrote to memory of 2512 2248 cmd.exe 116 PID 2248 wrote to memory of 2512 2248 cmd.exe 116 PID 1776 wrote to memory of 1364 1776 cmd.exe 117 PID 1776 wrote to memory of 1364 1776 cmd.exe 117 PID 3444 wrote to memory of 1628 3444 cmd.exe 118 PID 3444 wrote to memory of 1628 3444 cmd.exe 118 PID 1604 wrote to memory of 1636 1604 scpbsg0q.bat 119 PID 1604 wrote to memory of 1636 1604 scpbsg0q.bat 119 PID 1636 wrote to memory of 4836 1636 cmd.exe 121 PID 1636 wrote to memory of 4836 1636 cmd.exe 121 PID 1604 wrote to memory of 4360 1604 scpbsg0q.bat 122 PID 1604 wrote to memory of 4360 1604 scpbsg0q.bat 122 PID 4360 wrote to memory of 3460 4360 cmd.exe 124 PID 4360 wrote to memory of 3460 4360 cmd.exe 124 PID 2248 wrote to memory of 1032 2248 cmd.exe 125 PID 2248 wrote to memory of 1032 2248 cmd.exe 125 PID 1604 wrote to memory of 2132 1604 scpbsg0q.bat 126 PID 1604 wrote to memory of 2132 1604 scpbsg0q.bat 126 PID 1604 wrote to memory of 2320 1604 scpbsg0q.bat 128 PID 1604 wrote to memory of 2320 1604 scpbsg0q.bat 128 PID 1604 wrote to memory of 4720 1604 scpbsg0q.bat 130 PID 1604 wrote to memory of 4720 1604 scpbsg0q.bat 130 PID 1604 wrote to memory of 3780 1604 scpbsg0q.bat 131 PID 1604 wrote to memory of 3780 1604 scpbsg0q.bat 131 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 4680 attrib.exe 1236 attrib.exe 1032 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe"C:\Users\Admin\AppData\Local\Temp\0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Windows security modification
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WerSvc start=disabled2⤵
- Launches sc.exe
PID:452
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config wdfilter start=disabled2⤵
- Launches sc.exe
PID:4876
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter2⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\system32\sc.exesc stop wdfilter3⤵
- Launches sc.exe
PID:4932
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WinDefend start=disabled2⤵
- Launches sc.exe
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\scpbsg0q.bat"C:\Users\Admin\AppData\Local\Temp\scpbsg0q.bat" ok2⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WerSvc start=disabled3⤵
- Launches sc.exe
PID:1012
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config wdfilter start=disabled3⤵
- Launches sc.exe
PID:3660
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter3⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\sc.exesc stop wdfilter4⤵
- Launches sc.exe
PID:2940
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WinDefend start=disabled3⤵
- Launches sc.exe
PID:1756
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WerSvc3⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\sc.exesc stop WerSvc4⤵
- Launches sc.exe
PID:1364
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WdNisSvc start=disabled3⤵
- Launches sc.exe
PID:1500
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:1628
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config XblGameSave start=disabled3⤵
- Launches sc.exe
PID:3544
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc3⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\sc.exesc stop WdNisSvc4⤵
- Launches sc.exe
PID:4836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop XblGameSave3⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\sc.exesc stop XblGameSave4⤵
- Launches sc.exe
PID:3460
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "XXXXX" -AppPathNameMatchCondition "C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.exe" -ThrottleRateActionBitsPerSecond 83⤵
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "YYYYY" -AppPathNameMatchCondition "C:\Program Files (x86)\Common Files\BattlEye\BEService.exe" -ThrottleRateActionBitsPerSecond 83⤵
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter3⤵PID:4720
-
C:\Windows\system32\sc.exesc stop wdfilter4⤵
- Launches sc.exe
PID:3836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop faceit3⤵PID:3780
-
C:\Windows\system32\sc.exesc stop faceit4⤵
- Launches sc.exe
PID:3528
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8496a7e6-b259-44ba-894b-0b1cff02395b.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe"3⤵
- Views/modifies file attributes
PID:4680
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "HiberbootEnabled" /t REG_DWORD /d 0 /f3⤵PID:3144
-
-
C:\Windows\system32\timeout.exetimeout /T 13⤵
- Delays execution with timeout.exe
PID:3412
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\0c8c54fdd4059466eb4867c961d032351642ade27d8f3d79c46caf075394384aN.exe"3⤵
- Views/modifies file attributes
PID:1236
-
-
C:\Windows\system32\wevtutil.exewevtutil el3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\8496a7e6-b259-44ba-894b-0b1cff02395b.bat"3⤵
- Views/modifies file attributes
PID:1032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
948B
MD5c1a54dd5a1ab44cc4c4afd42f291c863
SHA1b77043ab3582680fc96192e9d333a6be0ae0f69d
SHA256c6dce870a896f3531ae7a10a0c2096d2eb7eb5989ae783aefea6150279502d75
SHA512010f5093f58b0393d17c824a357513cf4f06239ccddd86c2e0581347ef3b8e7b93f869b0770bdaeb000e4fda7e14f49b9e45663a3839ab049446e9fe08ec535d
-
Filesize
780B
MD5af6ab7bf9461c6af0920231f8e01226d
SHA17a3c1c4ba9c4dbd1ea8cc96eeec7411d31250951
SHA256ce653f7ee43197a8b16f3a103dee3ef80f3b751ef1f893ea35bda7d9f29c86ca
SHA512c9414324e4d3f0d6e589c47466bdfab96b1fe099c162c8b7ce416baaa0717987fef873f0703299c943128ba6721a91a9cc7ed6494df25929f5d9ac8ba8af6b72
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
346KB
MD58ff9cdbfdc5489b1d754f5421a4191aa
SHA16dc720ca9283d5043ea1c49fbdcd04d60580cd46
SHA256bb643f1a273cd1642196f53ec390de1897225d21a3e77276ce1cad3800243090
SHA51221c082a017ba8e1b60a4933bdc563150aa61e304d98ab5e72be38c90a37f6f5acbab09100779c0df583aa37cce87aadbfd12f3ba0be4f0cfb875fc1b2293f189
-
Filesize
271B
MD5692c90b639d6e26e567a58f9c8f4349c
SHA1f55309e53474d83de25ccdb55be9cb0f8ab79ae4
SHA256606eac6b1af6576e1f32e17569a6f9ca5d2cc5a48aee8b9fd88f8f1df1893ed8
SHA5128537e0e4bb26a6fab3b8d92082e5af847428640d78ade44c3bf5a59f7ab5fd24e32d6e88c7ae8ea70ea0fa762cf2dd8668081e5811c7e983902330906df2ccef