Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1SetupX.zip
windows7-x64
1SetupX.zip
windows10-2004-x64
1Data/Packa...in.xml
windows7-x64
1Data/Packa...in.xml
windows10-2004-x64
1Data/Packa...ls.xml
windows7-x64
1Data/Packa...ls.xml
windows10-2004-x64
1Resource.dll
windows7-x64
1Resource.dll
windows10-2004-x64
1Setup.exe
windows7-x64
1Setup.exe
windows10-2004-x64
7jre/Welcome.html
windows7-x64
1jre/Welcome.html
windows10-2004-x64
1jre/bin/JA...32.dll
windows7-x64
1jre/bin/JA...32.dll
windows10-2004-x64
1jre/bin/JA...ge.dll
windows7-x64
1jre/bin/JA...ge.dll
windows10-2004-x64
1jre/bin/Ja...32.dll
windows7-x64
1jre/bin/Ja...32.dll
windows10-2004-x64
1jre/bin/Ja...ge.dll
windows7-x64
1jre/bin/Ja...ge.dll
windows10-2004-x64
1jre/bin/Wi...32.dll
windows7-x64
3jre/bin/Wi...32.dll
windows10-2004-x64
3jre/bin/Wi...ge.dll
windows7-x64
3jre/bin/Wi...ge.dll
windows10-2004-x64
3jre/bin/awt.dll
windows7-x64
1jre/bin/awt.dll
windows10-2004-x64
1jre/bin/bci.dll
windows7-x64
3jre/bin/bci.dll
windows10-2004-x64
3jre/bin/cl...vm.dll
windows7-x64
3jre/bin/cl...vm.dll
windows10-2004-x64
3jre/bin/dcpr.dll
windows7-x64
1jre/bin/dcpr.dll
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
SetupX.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SetupX.zip
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
Data/Packaged/Main.xml
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Data/Packaged/Main.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
Data/Packaged/Utils.xml
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Data/Packaged/Utils.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Resource.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Resource.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
jre/Welcome.html
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
jre/Welcome.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral17
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
jre/bin/JavaAccessBridge.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
jre/bin/JavaAccessBridge.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
jre/bin/awt.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
jre/bin/awt.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
jre/bin/bci.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
jre/bin/bci.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
jre/bin/client/jvm.dll
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
jre/bin/client/jvm.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
jre/bin/dcpr.dll
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
jre/bin/dcpr.dll
Resource
win10v2004-20230220-en
General
-
Target
Setup.exe
-
Size
6.7MB
-
MD5
23d9a8cf15fe71598614e769e409c3df
-
SHA1
b5b397f733c4acf378cf707c60db9488b38ce5a8
-
SHA256
5a68fb28c84d3c0850006e6d6355075d99049adf5c939afba3c945bad7be673c
-
SHA512
1b48ade8a793d4cdcd93b343175c1cc822ed3298c8293393edc702033b15e9fe9385967ca7fda33279dfa2790c59c9dad3c2181ed31a3f1fedaca4fd6f06e64f
-
SSDEEP
98304:lc+kjotiAzy6lfxocFW2kTBrHJWGs2NyqeoNE/7SRYY2VymGu/m6zHAlA64TRRs:cjOpzhrt9kTVHJack+YlGlSRRs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation Nzg1YWM4MzJlZjhhNDYxNWQ5MTNiMTU1YzJmNWRiZGU.exe -
Executes dropped EXE 2 IoCs
pid Process 4008 Nzg1YWM4MzJlZjhhNDYxNWQ5MTNiMTU1YzJmNWRiZGU.exe 4424 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1800 javaw.exe 1800 javaw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1800 1704 Setup.exe 82 PID 1704 wrote to memory of 1800 1704 Setup.exe 82 PID 1704 wrote to memory of 1800 1704 Setup.exe 82 PID 1800 wrote to memory of 3264 1800 javaw.exe 90 PID 1800 wrote to memory of 3264 1800 javaw.exe 90 PID 1800 wrote to memory of 3264 1800 javaw.exe 90 PID 4168 wrote to memory of 4008 4168 explorer.exe 92 PID 4168 wrote to memory of 4008 4168 explorer.exe 92 PID 4168 wrote to memory of 4008 4168 explorer.exe 92 PID 4008 wrote to memory of 4424 4008 Nzg1YWM4MzJlZjhhNDYxNWQ5MTNiMTU1YzJmNWRiZGU.exe 94 PID 4008 wrote to memory of 4424 4008 Nzg1YWM4MzJlZjhhNDYxNWQ5MTNiMTU1YzJmNWRiZGU.exe 94 PID 4008 wrote to memory of 4424 4008 Nzg1YWM4MzJlZjhhNDYxNWQ5MTNiMTU1YzJmNWRiZGU.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe"C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "C:\Users\Admin\AppData\Local\Temp\Setup.exe" org.develnext.jphp.ext.javafx.FXLauncher2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\Nzg1YWM4MzJlZjhhNDYxNWQ5MTNiMTU1YzJmNWRiZGU.exe3⤵PID:3264
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Nzg1YWM4MzJlZjhhNDYxNWQ5MTNiMTU1YzJmNWRiZGU.exe"C:\Users\Admin\AppData\Local\Temp\Nzg1YWM4MzJlZjhhNDYxNWQ5MTNiMTU1YzJmNWRiZGU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵PID:1112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"3⤵PID:1440
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'4⤵PID:1168
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154.7MB
MD52010d2c3cb1a127e7db143201c2eb9b8
SHA1cd51c0b1457acb7d5cec4a76d4ff41463541e6dd
SHA25664859e1b59756535e53b37d8d9b63b80d4014d3a0b16f9a439641283006fda7d
SHA512ab6ac4602c5e86840ab820804b7291e4983e005734b87f94fa58cce707f20292dbf4e6ccc8161b1c9dbcde0a0d75e402e8ae343e2363bcd4164986b8c40d0a91
-
Filesize
16.3MB
MD5d002bd3f21421dd87ca8cb0794181d69
SHA18d88e8124ed99def8a0595d4a3c6f50d4c013b09
SHA256fb2dd407c23ffd36cfaef9376fe776342bb54368506df14990c4d1be4ebe0927
SHA512aee0040c412f8c7f4b5aa9650c8bbb09c4aed7f750cc39b79b9a3c880ad46132e3721ac680dee004544a2e73436662215abe557b3431f87e3928f2d635c3b2bf
-
Filesize
15.6MB
MD549b1992184141a10b2b96f4c07fbad28
SHA126eebee3dd97fbeeb388c85f9c3ab695183537e0
SHA2560662ebdc6e0aca9f34461a441fb1b84d7c7b5daf31cb2839e2644e4df85df795
SHA5120e9784a706d34c05e5769225e640394248c0077a1f1e0494de6daa6b6ab6bf8d9c0f2de6bb7239c4e2a39286cb91fdc0686aaf981e4f79902a2b2b7960ab7b18
-
Filesize
1.6MB
MD5916a9dbf2764445c174d5a470936d8fd
SHA16d37f682357800382b61115b01f4fcebd6862103
SHA2567f9496b9c6d4d1571cea5969472dcf8a363ae0b728b55ee9fe83d57975627117
SHA5129782e25b8a8bfd9fac7763c9e3af160b89eb7d74fddc9ef234c6f209e26a8c43812dd22ae054ca94aefc27ce39d4a8c2592058dbf433e410181f192e6da8ff59
-
Filesize
1.6MB
MD5916a9dbf2764445c174d5a470936d8fd
SHA16d37f682357800382b61115b01f4fcebd6862103
SHA2567f9496b9c6d4d1571cea5969472dcf8a363ae0b728b55ee9fe83d57975627117
SHA5129782e25b8a8bfd9fac7763c9e3af160b89eb7d74fddc9ef234c6f209e26a8c43812dd22ae054ca94aefc27ce39d4a8c2592058dbf433e410181f192e6da8ff59
-
Filesize
997KB
MD543e651c15b6a352f30b64e13ef747334
SHA1fb987832689f996252e742182e7d3a5f2256c2f9
SHA2565f6ed3bf10af3dfc4ae0d33dd25585243baec24cae622b22545f7626050d618f
SHA51278adfca7b128f6e4c4797a772cb67d469f763c5f55da3e032baa03a28b7f1ec6fa579c95655cee377bee359970224aa69d3c9b8951fbb46bf4e8f57483a37449
-
Filesize
997KB
MD543e651c15b6a352f30b64e13ef747334
SHA1fb987832689f996252e742182e7d3a5f2256c2f9
SHA2565f6ed3bf10af3dfc4ae0d33dd25585243baec24cae622b22545f7626050d618f
SHA51278adfca7b128f6e4c4797a772cb67d469f763c5f55da3e032baa03a28b7f1ec6fa579c95655cee377bee359970224aa69d3c9b8951fbb46bf4e8f57483a37449
-
Filesize
997KB
MD543e651c15b6a352f30b64e13ef747334
SHA1fb987832689f996252e742182e7d3a5f2256c2f9
SHA2565f6ed3bf10af3dfc4ae0d33dd25585243baec24cae622b22545f7626050d618f
SHA51278adfca7b128f6e4c4797a772cb67d469f763c5f55da3e032baa03a28b7f1ec6fa579c95655cee377bee359970224aa69d3c9b8951fbb46bf4e8f57483a37449