Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe
Resource
win10v2004-20220901-en
General
-
Target
b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe
-
Size
64KB
-
MD5
edf92f3f42d6cb634254b384c8c214de
-
SHA1
18d42a714fa8a1fd2178e762ea8f5a02a4ec88f2
-
SHA256
b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6
-
SHA512
263af274f7133527bf2f44d786851a827c3d3091a76cd8310fde9d559fe1bc22eab870cfdf9ecef0b3644f8639d1912fc8374dc82a30e4a0d24a8e2463eaa6e6
-
SSDEEP
768:6/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLh:6RsvcdcQjosnvnZ6LQ1Eh
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1656 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1008 b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe 1008 b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe 1656 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1008 wrote to memory of 1656 1008 b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe 28 PID 1008 wrote to memory of 1656 1008 b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe 28 PID 1008 wrote to memory of 1656 1008 b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe 28 PID 1008 wrote to memory of 1656 1008 b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe"C:\Users\Admin\AppData\Local\Temp\b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5a8b9a4bdccccd5f3fb13f3ab35c14297
SHA1d8fb8584cd33b90c3a4c0cfda9e5968197590eef
SHA256b34df58cdfc7e9a149c5284ee4427e9bc33e3e6dfda1b678b2de828d85080b2f
SHA51225e533a41d534f1256db2d9ccbbea6fb193609982f63c1c0f0eab72bbfb2128b1f84f26ea180e7d6d3c1ab4f19eca8e381a18c43509b5c679ea7709a463cf788
-
Filesize
64KB
MD5a8b9a4bdccccd5f3fb13f3ab35c14297
SHA1d8fb8584cd33b90c3a4c0cfda9e5968197590eef
SHA256b34df58cdfc7e9a149c5284ee4427e9bc33e3e6dfda1b678b2de828d85080b2f
SHA51225e533a41d534f1256db2d9ccbbea6fb193609982f63c1c0f0eab72bbfb2128b1f84f26ea180e7d6d3c1ab4f19eca8e381a18c43509b5c679ea7709a463cf788
-
Filesize
64KB
MD5a8b9a4bdccccd5f3fb13f3ab35c14297
SHA1d8fb8584cd33b90c3a4c0cfda9e5968197590eef
SHA256b34df58cdfc7e9a149c5284ee4427e9bc33e3e6dfda1b678b2de828d85080b2f
SHA51225e533a41d534f1256db2d9ccbbea6fb193609982f63c1c0f0eab72bbfb2128b1f84f26ea180e7d6d3c1ab4f19eca8e381a18c43509b5c679ea7709a463cf788