Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2023, 20:04

General

  • Target

    70a2b4ab4c4f4f8027aafc3f2cfdefa959830222205b93d36dfc7429f5e4be3a.exe

  • Size

    1.5MB

  • MD5

    ece53f756522240e016186d141321d25

  • SHA1

    8e8a7e24240373d867b94db9af05b760e81309af

  • SHA256

    70a2b4ab4c4f4f8027aafc3f2cfdefa959830222205b93d36dfc7429f5e4be3a

  • SHA512

    a392e2ebf074decc93136f356eae11c8bbef66307d5987f739736e14ac73a783b558286420093c635bcd10bc29ce22fc505e4e8b4afa5ba1ca7b4fb14d716456

  • SSDEEP

    24576:GM7CKVVVMxPcROUnuXGJYybQ56dOA/85RkV4lN/ZLqg/YmrkjeWz:1AseGJPQ0OAUfkVyN/ZLCMkj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70a2b4ab4c4f4f8027aafc3f2cfdefa959830222205b93d36dfc7429f5e4be3a.exe
    "C:\Users\Admin\AppData\Local\Temp\70a2b4ab4c4f4f8027aafc3f2cfdefa959830222205b93d36dfc7429f5e4be3a.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\9695.tmp
      C:\Users\Admin\AppData\Local\Temp\9695.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2868
    • C:\Program Files\Java\jre7\bin\javaws.exe
      "C:\Program Files\Java\jre7\bin\javaws.exe" -J-Djdk.disableLastUsageTracking=true -SSVBaselineUpdate
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Program Files\Java\jre7\bin\jp2launcher.exe
        "C:\Program Files\Java\jre7\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre7" -vma 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 -ma LVNTVkJhc2VsaW5lVXBkYXRlAC1ub3RXZWJKYXZh
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\46ceb172-5cd6f241

    Filesize

    12KB

    MD5

    36fa8fdbf8b864c7c23e3cb8cbebc9a4

    SHA1

    427d008a3de77b207217e79fd8f3ef6aa83e3cef

    SHA256

    b8d88484bdcd972c2df39e19286b376e8606a0f86310635a3a97157c58e9a639

    SHA512

    4ff71d0c7e13575d39e0668dc61fc9c50e5bddf3628e1e923ec2c7ca2126fac02256b6e4e7ee7caeedb47f0222c94b66a2d2ee0b27eaa26de9f9d3f47e936dc0

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties

    Filesize

    685B

    MD5

    22d4ef9d1395cb0f4a8220a8e669f203

    SHA1

    1669e087e7e61c4de02e0d71209a746f74e9184c

    SHA256

    be2e7c4b4cdbbb9a443ef2867f6937c905aa832c323f09b75b2700e587900f06

    SHA512

    6aaacf5df64da38f79c25059febc6db7ec329b21b2660dedc775435715b27bccf78b08e56bc2fd2d153ec25052092d3d78ed62e41138e8d6ca1074062dc0b377

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\security\securitypack.jar

    Filesize

    12KB

    MD5

    47933033943e6337137aa28bf027a1a2

    SHA1

    c16d83e0c6bd2356bf3257fcedcccadfd05c3dbb

    SHA256

    3243018f8d3f21ea0699ecce258dde161c899fb3d248eb12312ee2d540ab3029

    SHA512

    97ea0697af504b98c14b1355df24f9e9f668cd59e9c44880f562dfe3cf183d92aadbbf07c9f2aa69161437c266631d638fc286b8d5b168a222b76e894cdca313

  • C:\Users\Admin\AppData\Local\Temp\9695.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Local\Temp\9695.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Local\Temp\9695.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    4KB

    MD5

    bec8247dde8cc0a27e57424b23a7177a

    SHA1

    0a73daf25181a1a0e0e379daebcb086d2e9a2434

    SHA256

    5183ef10daa84d38388f2eae961e600f031b41df67eae02dc873b5ce8bb8c882

    SHA512

    972906a6e6bf58e24b7c8ff174f89252b2e45f38780960ead5aa4de6b36769ee875b7b3a9dafb83b2d981d660c9efc4165b2efdb8b6bc3dbcc6f748b5fa3a27b

  • \Users\Admin\AppData\Local\Temp\9695.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • \Users\Admin\AppData\Local\Temp\9695.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • memory/1632-0-0x0000000001CC0000-0x0000000001D0F000-memory.dmp

    Filesize

    316KB

  • memory/1632-1-0x0000000001CC0000-0x0000000001D0F000-memory.dmp

    Filesize

    316KB

  • memory/2892-185-0x0000000002560000-0x0000000005560000-memory.dmp

    Filesize

    48.0MB

  • memory/2892-234-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2892-187-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2892-174-0x00000000000F0000-0x00000000000FA000-memory.dmp

    Filesize

    40KB

  • memory/2892-209-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2892-224-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2892-227-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2892-175-0x00000000000F0000-0x00000000000FA000-memory.dmp

    Filesize

    40KB

  • memory/2892-242-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2892-273-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2892-286-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2892-291-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2892-55-0x0000000002560000-0x0000000005560000-memory.dmp

    Filesize

    48.0MB

  • memory/2892-48-0x00000000000F0000-0x00000000000FA000-memory.dmp

    Filesize

    40KB