Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2023, 20:59

General

  • Target

    d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe

  • Size

    1.4MB

  • MD5

    aa7a505e7cd588769739619ba2677a44

  • SHA1

    61a081b405bd7d5e54be1cb5d71123527c145700

  • SHA256

    d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639

  • SHA512

    24935a392bf354c74b4d2d33ad3f4b41db7acd7219d55aa32c0040172fc56f8d98048abd89b657fae43edd72446cd045cb851ed4ea89271bb4d95c41042fe9d9

  • SSDEEP

    24576:cLZpHi0JtVQ7BIbdBIycGJZLwgf56dOA/85RkV4la/ZS6JJKf0EoVr5DBeA:099rcGJOgf0OAUfkVya/ZS6JAjoFt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe
    "C:\Users\Admin\AppData\Local\Temp\d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\8C87.tmp
      C:\Users\Admin\AppData\Local\Temp\8C87.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2764
    • C:\Program Files\Java\jre7\bin\javaws.exe
      "C:\Program Files\Java\jre7\bin\javaws.exe" -J-Djdk.disableLastUsageTracking=true -SSVBaselineUpdate
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Program Files\Java\jre7\bin\jp2launcher.exe
        "C:\Program Files\Java\jre7\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre7" -vma 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 -ma LVNTVkJhc2VsaW5lVXBkYXRlAC1ub3RXZWJKYXZh
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\46ceb172-45bf78c1

    Filesize

    12KB

    MD5

    36fa8fdbf8b864c7c23e3cb8cbebc9a4

    SHA1

    427d008a3de77b207217e79fd8f3ef6aa83e3cef

    SHA256

    b8d88484bdcd972c2df39e19286b376e8606a0f86310635a3a97157c58e9a639

    SHA512

    4ff71d0c7e13575d39e0668dc61fc9c50e5bddf3628e1e923ec2c7ca2126fac02256b6e4e7ee7caeedb47f0222c94b66a2d2ee0b27eaa26de9f9d3f47e936dc0

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties

    Filesize

    685B

    MD5

    4120e5a54579dd844e91722feae264bd

    SHA1

    8ea15248c745a3198ea477697ade8875812ea8bd

    SHA256

    e80fbe0e39fb9f6a2b8a1973758bbd3392e12757297bc9d64ca9661b33441d2c

    SHA512

    f93bbf15ef6bb3092dee641c83116b3c9ab8bdbcdf8d0befb8e4184494cec1dc3bcf7ce2e8f79350ff60a9f2f54cd4d95c6d4e8f89cdb1aee16625249ff2cec5

  • C:\Users\Admin\AppData\Local\Temp\8C87.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Local\Temp\8C87.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Local\Temp\8C87.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Local\Temp\jar_cache5199999004566592906.tmp

    Filesize

    12KB

    MD5

    47933033943e6337137aa28bf027a1a2

    SHA1

    c16d83e0c6bd2356bf3257fcedcccadfd05c3dbb

    SHA256

    3243018f8d3f21ea0699ecce258dde161c899fb3d248eb12312ee2d540ab3029

    SHA512

    97ea0697af504b98c14b1355df24f9e9f668cd59e9c44880f562dfe3cf183d92aadbbf07c9f2aa69161437c266631d638fc286b8d5b168a222b76e894cdca313

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    6KB

    MD5

    742f89a1d207c74b41df4e3396f1752a

    SHA1

    c4caf297dc4249c7ec274c721dd78857749f3e8c

    SHA256

    25ecd9c53faefe49a11001f2b738a89f9bbb698f45981b4c4fbd372d8a791f92

    SHA512

    a74a66aa346770d89c15539c284ce9dc200011b05f0e92bf0ec822a4e0083074bec9dd1c1609d55e34368041a6b7f295700b8dd7ffdd5b4edd8fba0296ee8b6b

  • \Users\Admin\AppData\Local\Temp\8C87.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • \Users\Admin\AppData\Local\Temp\8C87.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • memory/2300-1-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/2300-0-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/2712-227-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-274-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-229-0x00000000025E0000-0x00000000055E0000-memory.dmp

    Filesize

    48.0MB

  • memory/2712-232-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-234-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-256-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-263-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-52-0x00000000025E0000-0x00000000055E0000-memory.dmp

    Filesize

    48.0MB

  • memory/2712-273-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-294-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-295-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-49-0x00000000000F0000-0x00000000000FA000-memory.dmp

    Filesize

    40KB

  • memory/2712-48-0x00000000000F0000-0x00000000000FA000-memory.dmp

    Filesize

    40KB

  • memory/2712-314-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2712-315-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB