Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2023, 19:31

General

  • Target

    ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe

  • Size

    1.3MB

  • MD5

    47b71dd381f7c798944b0f137803f3a9

  • SHA1

    887714d31fee90b70fb6adc2598a5d6ba110807d

  • SHA256

    ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da

  • SHA512

    a6a49757b88dfc6898ed65686a0cc485a498e65e45a4cba0704155fb525d0720f860573304b605c2dec5917d77427f94b04d2435aafb3e74a76223cfd1c7fb7d

  • SSDEEP

    24576:dyZpEwtiE7hgnY5c8l8Ugdg2GxKf13RMElW6R+Ie5M36bZ7GRT6GrOiGI:4ZpEwtr715c8CFiA1BX/Be31Pi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5633970.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5633970.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4313662.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4313662.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5102183.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5102183.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1480
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2732
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2508
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 268
                    7⤵
                    • Program crash
                    PID:2500
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 288
                  6⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2540

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5633970.exe

        Filesize

        1.2MB

        MD5

        a6c26e119c920f70c95d0fec223516cb

        SHA1

        cd4e5eeba5e9bd0f9870b4d4b89a299d20d86d4e

        SHA256

        3cdd5a14f1e48461c766aad4a1238f55117eb1f4ce06c4c1470369596332d76e

        SHA512

        6f46a7cf7369d3cdbed562c5a01461f33d512de7131a213c87488ab8bb385152e0aa2194ffa10df228d2b7d157139b80425c04391b1c484b55c61b174b0f7977

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5633970.exe

        Filesize

        1.2MB

        MD5

        a6c26e119c920f70c95d0fec223516cb

        SHA1

        cd4e5eeba5e9bd0f9870b4d4b89a299d20d86d4e

        SHA256

        3cdd5a14f1e48461c766aad4a1238f55117eb1f4ce06c4c1470369596332d76e

        SHA512

        6f46a7cf7369d3cdbed562c5a01461f33d512de7131a213c87488ab8bb385152e0aa2194ffa10df228d2b7d157139b80425c04391b1c484b55c61b174b0f7977

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4313662.exe

        Filesize

        923KB

        MD5

        445c48a2d7e8e24cee4ebf3490e8cc4f

        SHA1

        090be32a2397bea6c70b269069c96ce445704f69

        SHA256

        3932eb12577d4e697956c4c7659c7273afd3e212114de1bb86cfe5ccd66cb929

        SHA512

        158a29b5d3a263df8d019c89704e017c94efc711b94b192a1da1e3f6ac075f41d957f0800852ea56111ab13c454d0c34889aabbdc84c08852089f7ee0949896b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4313662.exe

        Filesize

        923KB

        MD5

        445c48a2d7e8e24cee4ebf3490e8cc4f

        SHA1

        090be32a2397bea6c70b269069c96ce445704f69

        SHA256

        3932eb12577d4e697956c4c7659c7273afd3e212114de1bb86cfe5ccd66cb929

        SHA512

        158a29b5d3a263df8d019c89704e017c94efc711b94b192a1da1e3f6ac075f41d957f0800852ea56111ab13c454d0c34889aabbdc84c08852089f7ee0949896b

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5102183.exe

        Filesize

        532KB

        MD5

        495b3075da144176b20e165e58908190

        SHA1

        5e5151e0c8fb51ea11c7413da36272718b0fb6e7

        SHA256

        c79ead509a78ed266b82cd41062cacc7a2dd5423299f50de8fd4b25fdbfefe45

        SHA512

        c685e063337a60538d49914ca06d5502f1e7fa71b581de3112f65b5321d89a4b3e8ddf322aed3a319be84e63eeb85a8cc15ee68aef166cf778c34c7b44818e74

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5102183.exe

        Filesize

        532KB

        MD5

        495b3075da144176b20e165e58908190

        SHA1

        5e5151e0c8fb51ea11c7413da36272718b0fb6e7

        SHA256

        c79ead509a78ed266b82cd41062cacc7a2dd5423299f50de8fd4b25fdbfefe45

        SHA512

        c685e063337a60538d49914ca06d5502f1e7fa71b581de3112f65b5321d89a4b3e8ddf322aed3a319be84e63eeb85a8cc15ee68aef166cf778c34c7b44818e74

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5633970.exe

        Filesize

        1.2MB

        MD5

        a6c26e119c920f70c95d0fec223516cb

        SHA1

        cd4e5eeba5e9bd0f9870b4d4b89a299d20d86d4e

        SHA256

        3cdd5a14f1e48461c766aad4a1238f55117eb1f4ce06c4c1470369596332d76e

        SHA512

        6f46a7cf7369d3cdbed562c5a01461f33d512de7131a213c87488ab8bb385152e0aa2194ffa10df228d2b7d157139b80425c04391b1c484b55c61b174b0f7977

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5633970.exe

        Filesize

        1.2MB

        MD5

        a6c26e119c920f70c95d0fec223516cb

        SHA1

        cd4e5eeba5e9bd0f9870b4d4b89a299d20d86d4e

        SHA256

        3cdd5a14f1e48461c766aad4a1238f55117eb1f4ce06c4c1470369596332d76e

        SHA512

        6f46a7cf7369d3cdbed562c5a01461f33d512de7131a213c87488ab8bb385152e0aa2194ffa10df228d2b7d157139b80425c04391b1c484b55c61b174b0f7977

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4313662.exe

        Filesize

        923KB

        MD5

        445c48a2d7e8e24cee4ebf3490e8cc4f

        SHA1

        090be32a2397bea6c70b269069c96ce445704f69

        SHA256

        3932eb12577d4e697956c4c7659c7273afd3e212114de1bb86cfe5ccd66cb929

        SHA512

        158a29b5d3a263df8d019c89704e017c94efc711b94b192a1da1e3f6ac075f41d957f0800852ea56111ab13c454d0c34889aabbdc84c08852089f7ee0949896b

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4313662.exe

        Filesize

        923KB

        MD5

        445c48a2d7e8e24cee4ebf3490e8cc4f

        SHA1

        090be32a2397bea6c70b269069c96ce445704f69

        SHA256

        3932eb12577d4e697956c4c7659c7273afd3e212114de1bb86cfe5ccd66cb929

        SHA512

        158a29b5d3a263df8d019c89704e017c94efc711b94b192a1da1e3f6ac075f41d957f0800852ea56111ab13c454d0c34889aabbdc84c08852089f7ee0949896b

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5102183.exe

        Filesize

        532KB

        MD5

        495b3075da144176b20e165e58908190

        SHA1

        5e5151e0c8fb51ea11c7413da36272718b0fb6e7

        SHA256

        c79ead509a78ed266b82cd41062cacc7a2dd5423299f50de8fd4b25fdbfefe45

        SHA512

        c685e063337a60538d49914ca06d5502f1e7fa71b581de3112f65b5321d89a4b3e8ddf322aed3a319be84e63eeb85a8cc15ee68aef166cf778c34c7b44818e74

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5102183.exe

        Filesize

        532KB

        MD5

        495b3075da144176b20e165e58908190

        SHA1

        5e5151e0c8fb51ea11c7413da36272718b0fb6e7

        SHA256

        c79ead509a78ed266b82cd41062cacc7a2dd5423299f50de8fd4b25fdbfefe45

        SHA512

        c685e063337a60538d49914ca06d5502f1e7fa71b581de3112f65b5321d89a4b3e8ddf322aed3a319be84e63eeb85a8cc15ee68aef166cf778c34c7b44818e74

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe

        Filesize

        1.0MB

        MD5

        34ab1715842a73ae50230c4cabb65459

        SHA1

        d1e170de39a75dbd13137dbd65656036442adbff

        SHA256

        6310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7

        SHA512

        9012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167

      • memory/2508-47-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2508-48-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2508-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2508-50-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2508-52-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2508-54-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2508-46-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2508-45-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2508-43-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2508-44-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB