Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
203s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe
Resource
win10v2004-20221111-en
General
-
Target
a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe
-
Size
83KB
-
MD5
75d061d2dcc3162ad72ec6487a6c338f
-
SHA1
44ea7e9fa73f0194a3c22ad8d9af440edbb85b74
-
SHA256
a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929
-
SHA512
13fc3f58cf744fc5a7ec1d99049401d3f6ffc157dd418c0941c27c9b67057708f571d3a23742c323c9e02972d7513bdded372b5dcff6263de2f6d8293efeffad
-
SSDEEP
1536:61RxD1+NIgMZgHOCpLK0DCdMHKN/vO91Zbo6856kpjVrs2ryrd1vUQuqwcizSkX:SDUXpLKT5vo1+B56kHs2quciu
Malware Config
Signatures
-
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\README-JDK.html a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\qrhljwvn.exe a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\RELEASE-NOTES.html a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA6BB851-5F14-A819-6819-8E063D451B89} a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA6BB851-5F14-A819-6819-8E063D451B89}\ = "cstehskqnwwsxtrt" a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA6BB851-5F14-A819-6819-8E063D451B89}\LocalServer32 a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA6BB851-5F14-A819-6819-8E063D451B89}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe" a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1} a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\ = "qrhlnsrsvvqqlzls" a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\LocalServer32 a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\LocalServer32\ = "C:\\Program Files\\Java\\jdk1.8.0_66\\db\\qrhljwvn.exe" a64ce2eb37cd54b6db496ab16afb94538a781441351701550d60c03fa2934929.exe