Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe
Resource
win10v2004-20241007-en
General
-
Target
b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe
-
Size
224KB
-
MD5
234cf0bb76b4a717f7ec8a2cd0b53450
-
SHA1
6492d3f87dd0b1564a1a16d6a647a053228b831a
-
SHA256
b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831
-
SHA512
f44872418d84651ad3a11a927c2b0a59b053955e8ea70f84e098a024015b946fe5c80c0245c657ae7a60f0c35be578c31ce42c16cecb56d04c516d52c6ed9712
-
SSDEEP
3072:cfEFCI/HND//OfyT/v+r5nP398DFqIrOsyY6FyJU9KVpT:cWSyTX+r6FlrOsKc+9Kz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mcciab.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 mcciab.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe 3040 b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /v" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /l" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /h" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /s" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /e" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /u" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /m" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /d" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /g" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /t" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /w" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /x" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /r" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /f" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /i" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /j" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /b" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /o" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /w" b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /k" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /c" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /a" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /q" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /n" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /p" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /y" mcciab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\mcciab = "C:\\Users\\Admin\\mcciab.exe /z" mcciab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcciab.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3040 b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe 2216 mcciab.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3040 b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe 2216 mcciab.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2216 3040 b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe 30 PID 3040 wrote to memory of 2216 3040 b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe 30 PID 3040 wrote to memory of 2216 3040 b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe 30 PID 3040 wrote to memory of 2216 3040 b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe"C:\Users\Admin\AppData\Local\Temp\b0d3b0298bf8abd3c6fcbddb2aed4c9d722f8151543825fa71c69dce992de831N.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\mcciab.exe"C:\Users\Admin\mcciab.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5f09c1fe604c9f699c03cd9fbb36f5291
SHA15d82e049e1d6f1cd4dbf1c788fa921bc19be6439
SHA2560db07044b5a6cfcca1772d822a06879618ff8462db2b09596fa6300a9ab6705b
SHA512c96e6f4004957a7f3ed6bb21aa06377b48798abda810248ee3542ace5a4a0eeabae10fb327e5a1c98fd06463b7d0d71c377214b55fd0d4d40ae7929eb55ada36