Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
b8906bb02cd6de_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b8906bb02cd6de_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
b8906bb02cd6de_JC.exe
-
Size
274KB
-
MD5
b8906bb02cd6de1d98a0a7c6c56f7a90
-
SHA1
c116d654d37562269cadf499c3e46867124c2b1c
-
SHA256
92183838c519b789fc3bcd6ef1c8d9ad9dbf764947f622cf0370cef1f142cdd5
-
SHA512
0ce1a03704d50a332e36aad728de0263916667b1eefbdc13dc6c36cbd6fb36d6e8b06ddcb3de41f8c89f0200adf0f149cfbf2701a7f354ad4a660dd3f318dfc1
-
SSDEEP
6144:zYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:zYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation b8906bb02cd6de_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 4368 winit32.exe 2996 winit32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\DefaultIcon b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\DefaultIcon\ = "%1" b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\shell\open\command b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\ = "ntdriver" b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\open\command b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\runas b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\DefaultIcon\ = "%1" b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\winit32.exe\" /START \"%1\" %*" b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\open b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\runas\command b8906bb02cd6de_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\shell\open b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\shell\runas\command b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\ = "Application" b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\shell b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\DefaultIcon b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\winit32.exe\" /START \"%1\" %*" b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\ntdriver\shell\runas b8906bb02cd6de_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\Content-Type = "application/x-msdownload" b8906bb02cd6de_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings b8906bb02cd6de_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4368 winit32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4368 4068 b8906bb02cd6de_JC.exe 85 PID 4068 wrote to memory of 4368 4068 b8906bb02cd6de_JC.exe 85 PID 4068 wrote to memory of 4368 4068 b8906bb02cd6de_JC.exe 85 PID 4368 wrote to memory of 2996 4368 winit32.exe 86 PID 4368 wrote to memory of 2996 4368 winit32.exe 86 PID 4368 wrote to memory of 2996 4368 winit32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8906bb02cd6de_JC.exe"C:\Users\Admin\AppData\Local\Temp\b8906bb02cd6de_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"3⤵
- Executes dropped EXE
PID:2996
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD539a9d2e15a6b31fcba6ecdd1bbaf267a
SHA10023cc778ae0b91812878e4f3e467bc595ec807e
SHA2560f1046a675d7094a23962ec465bfd62ac8c683d83b78aac45885f608d0ebbce0
SHA5121af5c0a67683ccdb0b247a72e648f4522ae494f2ada1ad1dbf50703f11dbfc2a04d2a747bc6f5cd85e86263f15072f3ffc7a1549a5904e3a64c70821e99a04e4
-
Filesize
274KB
MD539a9d2e15a6b31fcba6ecdd1bbaf267a
SHA10023cc778ae0b91812878e4f3e467bc595ec807e
SHA2560f1046a675d7094a23962ec465bfd62ac8c683d83b78aac45885f608d0ebbce0
SHA5121af5c0a67683ccdb0b247a72e648f4522ae494f2ada1ad1dbf50703f11dbfc2a04d2a747bc6f5cd85e86263f15072f3ffc7a1549a5904e3a64c70821e99a04e4
-
Filesize
274KB
MD539a9d2e15a6b31fcba6ecdd1bbaf267a
SHA10023cc778ae0b91812878e4f3e467bc595ec807e
SHA2560f1046a675d7094a23962ec465bfd62ac8c683d83b78aac45885f608d0ebbce0
SHA5121af5c0a67683ccdb0b247a72e648f4522ae494f2ada1ad1dbf50703f11dbfc2a04d2a747bc6f5cd85e86263f15072f3ffc7a1549a5904e3a64c70821e99a04e4
-
Filesize
274KB
MD539a9d2e15a6b31fcba6ecdd1bbaf267a
SHA10023cc778ae0b91812878e4f3e467bc595ec807e
SHA2560f1046a675d7094a23962ec465bfd62ac8c683d83b78aac45885f608d0ebbce0
SHA5121af5c0a67683ccdb0b247a72e648f4522ae494f2ada1ad1dbf50703f11dbfc2a04d2a747bc6f5cd85e86263f15072f3ffc7a1549a5904e3a64c70821e99a04e4