Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe
Resource
win10v2004-20220901-en
General
-
Target
2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe
-
Size
340KB
-
MD5
a16b1f5ae255409158a60935dc90c810
-
SHA1
efac89a158a56cedabccf260b110aeb72c360b4e
-
SHA256
2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034
-
SHA512
5db2d89d67cb10acd92c35e0858c705944f4023ab6a085684ec8325db1423052aaba3f3627f46b09af807e053faf4354d67c71494b4fd3e627c386cc644daa61
-
SSDEEP
6144:2wwsXDz6A5+OEXE1Vxo8ISv+CgLNWLEXE1Vxo8ISvG:GeDz6y+kjxo8ISXgJW7jxo8ISO
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1604 MSWDM.EXE 1628 MSWDM.EXE 4812 2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE 4888 MSWDM.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javacpl.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\serialver.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jjs.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\pack200.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java.exe MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\policytool.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ktab.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe MSWDM.EXE File opened for modification C:\Program Files\7-Zip\7zG.exe MSWDM.EXE File opened for modification C:\Program Files\Internet Explorer\iexplore.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe MSWDM.EXE File opened for modification C:\Program Files\7-Zip\7z.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe MSWDM.EXE -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe File opened for modification C:\Windows\dev167.tmp 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe File opened for modification C:\Windows\die1A6.tmp MSWDM.EXE File opened for modification C:\Windows\dev167.tmp MSWDM.EXE File created C:\Windows\die1A6.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1628 MSWDM.EXE 1628 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1604 2344 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 80 PID 2344 wrote to memory of 1604 2344 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 80 PID 2344 wrote to memory of 1604 2344 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 80 PID 2344 wrote to memory of 1628 2344 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 81 PID 2344 wrote to memory of 1628 2344 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 81 PID 2344 wrote to memory of 1628 2344 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 81 PID 1628 wrote to memory of 4812 1628 MSWDM.EXE 82 PID 1628 wrote to memory of 4812 1628 MSWDM.EXE 82 PID 1628 wrote to memory of 4812 1628 MSWDM.EXE 82 PID 1628 wrote to memory of 4888 1628 MSWDM.EXE 83 PID 1628 wrote to memory of 4888 1628 MSWDM.EXE 83 PID 1628 wrote to memory of 4888 1628 MSWDM.EXE 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe"C:\Users\Admin\AppData\Local\Temp\2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1604
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev167.tmp!C:\Users\Admin\AppData\Local\Temp\2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE
- Executes dropped EXE
PID:4812
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev167.tmp!C:\Users\Admin\AppData\Local\Temp\2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE
Filesize340KB
MD510a8263cf27070992f5f040b66b6172b
SHA14e4d4c5168586eded4258cb352b60a00db8979a5
SHA2563069fc6c39fb4a68361a309dcada1ca110d4f7be6f3785d29e4cf865cb39414d
SHA5129ad782e959dacf20f8dc7d20daf99e98e506d3600388ae95f4bc064a994956019c74aa7d41b325b21180f0638db9e67acc66512aa651c8047cdb8d544b4ab7d1
-
C:\Users\Admin\AppData\Local\Temp\2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE
Filesize340KB
MD510a8263cf27070992f5f040b66b6172b
SHA14e4d4c5168586eded4258cb352b60a00db8979a5
SHA2563069fc6c39fb4a68361a309dcada1ca110d4f7be6f3785d29e4cf865cb39414d
SHA5129ad782e959dacf20f8dc7d20daf99e98e506d3600388ae95f4bc064a994956019c74aa7d41b325b21180f0638db9e67acc66512aa651c8047cdb8d544b4ab7d1
-
C:\Users\Admin\AppData\Local\Temp\2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe
Filesize300KB
MD5a6d64056ad6ca84534143757fd782d7a
SHA119e365305ceabad649ed67278587d2f80b94c78e
SHA2563bc9afaf7574b6d5abbbd11b571aae45abd24fc1d5691d4927444ec79dd0294b
SHA5126801ea8a1cf5f2112739bb9c5bb576b8cce4e952dcc5f2165568b80d6b80b9459f6dbda84f0db5061ca108b42c0d30d4a71ded228e1b04d4182f9f8e931afab4
-
Filesize
40KB
MD5e7fb0c65b222add4dfc4b7d6e3446dc9
SHA1beabd27b07033be8cc70b7f8e824ff07bf0971e6
SHA256aa5d36f32aaf7b642af97497641b349d0e1b52cd37096a40f8a9f142843357f2
SHA5123b434c1802c6defbeee0112f067d5368fee5ba20f2c83708a6ed20355c8e4b8b8c6ffad3a5ad69c0c4011bb1a48bd3dfb980396360d9ccf12c310a477519dd12
-
Filesize
40KB
MD5e7fb0c65b222add4dfc4b7d6e3446dc9
SHA1beabd27b07033be8cc70b7f8e824ff07bf0971e6
SHA256aa5d36f32aaf7b642af97497641b349d0e1b52cd37096a40f8a9f142843357f2
SHA5123b434c1802c6defbeee0112f067d5368fee5ba20f2c83708a6ed20355c8e4b8b8c6ffad3a5ad69c0c4011bb1a48bd3dfb980396360d9ccf12c310a477519dd12
-
Filesize
40KB
MD5e7fb0c65b222add4dfc4b7d6e3446dc9
SHA1beabd27b07033be8cc70b7f8e824ff07bf0971e6
SHA256aa5d36f32aaf7b642af97497641b349d0e1b52cd37096a40f8a9f142843357f2
SHA5123b434c1802c6defbeee0112f067d5368fee5ba20f2c83708a6ed20355c8e4b8b8c6ffad3a5ad69c0c4011bb1a48bd3dfb980396360d9ccf12c310a477519dd12
-
Filesize
40KB
MD5e7fb0c65b222add4dfc4b7d6e3446dc9
SHA1beabd27b07033be8cc70b7f8e824ff07bf0971e6
SHA256aa5d36f32aaf7b642af97497641b349d0e1b52cd37096a40f8a9f142843357f2
SHA5123b434c1802c6defbeee0112f067d5368fee5ba20f2c83708a6ed20355c8e4b8b8c6ffad3a5ad69c0c4011bb1a48bd3dfb980396360d9ccf12c310a477519dd12
-
Filesize
300KB
MD5a6d64056ad6ca84534143757fd782d7a
SHA119e365305ceabad649ed67278587d2f80b94c78e
SHA2563bc9afaf7574b6d5abbbd11b571aae45abd24fc1d5691d4927444ec79dd0294b
SHA5126801ea8a1cf5f2112739bb9c5bb576b8cce4e952dcc5f2165568b80d6b80b9459f6dbda84f0db5061ca108b42c0d30d4a71ded228e1b04d4182f9f8e931afab4