Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
b2a713c200db40a2516497ba113d3198742535cbb07745e625ce658ace882d69.jar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b2a713c200db40a2516497ba113d3198742535cbb07745e625ce658ace882d69.jar
Resource
win10v2004-20230220-en
General
-
Target
b2a713c200db40a2516497ba113d3198742535cbb07745e625ce658ace882d69.jar
-
Size
184KB
-
MD5
7ce3e372d644ecd63ec9393e12f10f3d
-
SHA1
9a8fb48b8c803ddb01357dbe4cf2aac845403926
-
SHA256
b2a713c200db40a2516497ba113d3198742535cbb07745e625ce658ace882d69
-
SHA512
5e079b575dab0470d813a5ce18b8a6f9dd076335a237c3fa37d12c94e7e0baed03165068d921e16328f86b6cc236e6ca31efb18df735f74e5f7c73ed1b71d5b9
-
SSDEEP
3072:0L7ikOOC1uBkeQERXx1uQmThP/w6Fr/eU3UcX3adbYkURt20rgy8ZItdUB98ZUuQ:RFOCABkeBSQmThPIoEcX2bYkURkCgy87
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 512 regedit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1984 wrote to memory of 268 1984 java.exe 28 PID 1984 wrote to memory of 268 1984 java.exe 28 PID 1984 wrote to memory of 268 1984 java.exe 28 PID 268 wrote to memory of 512 268 wscript.exe 29 PID 268 wrote to memory of 512 268 wscript.exe 29 PID 268 wrote to memory of 512 268 wscript.exe 29 PID 268 wrote to memory of 1044 268 wscript.exe 30 PID 268 wrote to memory of 1044 268 wscript.exe 30 PID 268 wrote to memory of 1044 268 wscript.exe 30
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\b2a713c200db40a2516497ba113d3198742535cbb07745e625ce658ace882d69.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\pfjpbuvttb.js2⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"3⤵
- Runs .reg file with regedit
PID:512
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\nbkcirynm.txt"3⤵PID:1044
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD50e5411d7ecba9a435afda71c6c39d8fd
SHA12d6812052bf7be1b5e213e1d813ae39faa07284c
SHA256cb68d50df5817e51ec5b2f72893dc4c749bf3504519107e0a78dda84d55f09e2
SHA512903ac6e5c8a12607af267b54bcbbedfa5542c5b4f7ea289ab7c6a32a424d5b846ae406d830cb4ad48e2b46f92c504163c0856af8c3e09685a8855f39f616ddb1
-
Filesize
92KB
MD5b3a05d912b60e2c471f690a04a502ac0
SHA12a7f45bd33f6e7c01e9d6e214fa019d2b428b1b3
SHA256cc1829c675aeee4047bc29bf4add2bc0f352703645abf5c07c1e22af01268e4d
SHA51299ec58267ada08a29851fb52aa664f619e4cac13b22b9c7c3d01011666da451a49ad547b295bd65ce2bb4e555e8f1b90470c5c978e3ed33e5e077e38d8bf1880
-
Filesize
845KB
MD5b306aece166677eb58828372a6b9e1d6
SHA101fee2f330c0479ee5059c2fcf1c7563e8a12df4
SHA25607b29512e4a1d43e3e96fa2c16cd9ddaf9ed8585278ce183caa60e3f2b0e2184
SHA512eff0158d7b0993f34369fc8e04c42e9538cee7410d06aed89e88eb94c71877df82ff6cfe3a9afc43cf182daf70b119e98c3f58ac6f814bdcdaaa58e8a0a46179