Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2023, 11:46

General

  • Target

    jre-6u25-windows-x64.exe

  • Size

    16.1MB

  • MD5

    44632e1d79bec1790fe72f76dbab1e75

  • SHA1

    fe7248273ff57960fc151bf96d814bc8a297063b

  • SHA256

    5b623c9877ad3c91fbf0b98b109f09f4d251856eeab637a46af29e946af4ef91

  • SHA512

    5fe963bc83370abf35414f42e02b6fbd70d29d84c95b4292f81b040c8d33cdcdd9c0a81a8f3fc3ca3e8b8bfdb02d0ef6761729f88cf8eee44002092327b41fe9

  • SSDEEP

    393216:e0iHkoRtJOLRYLmfjZC9Pyqbmvuu34VJ5LRK:Wko4eLgk97acJFM

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jre-6u25-windows-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\jre-6u25-windows-x64.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\system32\msiexec.exe
      "C:\Windows\system32\\msiexec.exe" /i "C:\Users\Admin\AppData\LocalLow\Sun\Java\jre1.6.0_25_x64\jre1.6.0_25.msi" METHOD=joff
      2⤵
      • Enumerates connected drives
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2088
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 5CBA24004DC1E915B732534EB142B2CE C
      2⤵
      • Loads dropped DLL
      PID:2864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\jre1.6.0_25_x64\jre1.6.0_25.msi

    Filesize

    666KB

    MD5

    dda7f40550bf9fe60d92c21a8b178ec2

    SHA1

    c521736f4b82ff666e5cadef80101dce08e1a5d3

    SHA256

    03557cf4e516fb1da79a7c9b0bb886235d98f6f006fe98cada13c27fd890a798

    SHA512

    7ae993c33c6b2e64e69b98d5a85bc654884dc4ce4d90dd71340495c1788683031a18aa5e691dff09c8a2aa3f725fdb730785901a670caf890c941606ad5afc26

  • C:\Users\Admin\AppData\Local\Temp\MSI8150.tmp

    Filesize

    103KB

    MD5

    d1c4f355d9924611bf790ab7e9973806

    SHA1

    b688845aea73f6696c14187bdf31c46242090272

    SHA256

    1096d8b0e56e3f148ad1ef2dd2047344196719d2229e57d69d7d87b73c505f94

    SHA512

    5fb79e0a88350f0508570062b7206f0f3161e738f7d9e9a217d74776a143dcd5e399741eedca71e0dea16f09a5b2c9f782750d6b0951aaf0d48603cf95f7b1bb

  • \Users\Admin\AppData\Local\Temp\MSI8150.tmp

    Filesize

    103KB

    MD5

    d1c4f355d9924611bf790ab7e9973806

    SHA1

    b688845aea73f6696c14187bdf31c46242090272

    SHA256

    1096d8b0e56e3f148ad1ef2dd2047344196719d2229e57d69d7d87b73c505f94

    SHA512

    5fb79e0a88350f0508570062b7206f0f3161e738f7d9e9a217d74776a143dcd5e399741eedca71e0dea16f09a5b2c9f782750d6b0951aaf0d48603cf95f7b1bb