Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe
Resource
win10v2004-20230915-en
General
-
Target
d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe
-
Size
1.4MB
-
MD5
aa7a505e7cd588769739619ba2677a44
-
SHA1
61a081b405bd7d5e54be1cb5d71123527c145700
-
SHA256
d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639
-
SHA512
24935a392bf354c74b4d2d33ad3f4b41db7acd7219d55aa32c0040172fc56f8d98048abd89b657fae43edd72446cd045cb851ed4ea89271bb4d95c41042fe9d9
-
SSDEEP
24576:cLZpHi0JtVQ7BIbdBIycGJZLwgf56dOA/85RkV4la/ZS6JJKf0EoVr5DBeA:099rcGJOgf0OAUfkVya/ZS6JAjoFt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2764 8C87.tmp -
Loads dropped DLL 2 IoCs
pid Process 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MAPIPH.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.aup 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\STSCOPY.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SSGEN.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSAutogen.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\MSADDNDR.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACER3X.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msmdlocal.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NL7Data0011.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\oisctrl.dll 8C87.tmp File opened for modification C:\Program Files\7-Zip\7zCon.sfx 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\msdia90.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\vstoee.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONWordAddin.dll 8C87.tmp File opened for modification C:\Program Files\7-Zip\7z.sfx 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\FPSRVUTL.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\xmlrwbin.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INLAUNCH.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DBGHELP.DLL 8C87.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\vdk150.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLMIME.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TWCUTCHR.DLL 8C87.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ahclient.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ENVELOPE.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORES.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Csi.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCVDT.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSStr32.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\ReadOutLoud.api 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\MSB1ESEN.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAME.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE 8C87.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Accessibility.api 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXP_PDF.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\MOFL.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONMAIN.DLL 8C87.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\JP2KLib.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMSMDB32.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GFX.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDCAT.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSAEXP30.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\EPSIMP32.FLT 8C87.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe 8C87.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\URLREDIR.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\authplay.dll 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FSTOCK.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VVIEWER.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\MSLID.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEES.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 8C87.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHEVI.DLL 8C87.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp 8C87.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll 8C87.tmp -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2712 jp2launcher.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 2712 jp2launcher.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2764 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 28 PID 2300 wrote to memory of 2764 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 28 PID 2300 wrote to memory of 2764 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 28 PID 2300 wrote to memory of 2764 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 28 PID 2300 wrote to memory of 2696 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 29 PID 2300 wrote to memory of 2696 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 29 PID 2300 wrote to memory of 2696 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 29 PID 2300 wrote to memory of 2696 2300 d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe 29 PID 2696 wrote to memory of 2712 2696 javaws.exe 30 PID 2696 wrote to memory of 2712 2696 javaws.exe 30 PID 2696 wrote to memory of 2712 2696 javaws.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe"C:\Users\Admin\AppData\Local\Temp\d15c56de680da5139c7472e648216fe69270b4dd405d637f2777652a9a958639.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\8C87.tmpC:\Users\Admin\AppData\Local\Temp\8C87.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2764
-
-
C:\Program Files\Java\jre7\bin\javaws.exe"C:\Program Files\Java\jre7\bin\javaws.exe" -J-Djdk.disableLastUsageTracking=true -SSVBaselineUpdate2⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files\Java\jre7\bin\jp2launcher.exe"C:\Program Files\Java\jre7\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre7" -vma 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 -ma LVNTVkJhc2VsaW5lVXBkYXRlAC1ub3RXZWJKYXZh3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD536fa8fdbf8b864c7c23e3cb8cbebc9a4
SHA1427d008a3de77b207217e79fd8f3ef6aa83e3cef
SHA256b8d88484bdcd972c2df39e19286b376e8606a0f86310635a3a97157c58e9a639
SHA5124ff71d0c7e13575d39e0668dc61fc9c50e5bddf3628e1e923ec2c7ca2126fac02256b6e4e7ee7caeedb47f0222c94b66a2d2ee0b27eaa26de9f9d3f47e936dc0
-
Filesize
685B
MD54120e5a54579dd844e91722feae264bd
SHA18ea15248c745a3198ea477697ade8875812ea8bd
SHA256e80fbe0e39fb9f6a2b8a1973758bbd3392e12757297bc9d64ca9661b33441d2c
SHA512f93bbf15ef6bb3092dee641c83116b3c9ab8bdbcdf8d0befb8e4184494cec1dc3bcf7ce2e8f79350ff60a9f2f54cd4d95c6d4e8f89cdb1aee16625249ff2cec5
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
12KB
MD547933033943e6337137aa28bf027a1a2
SHA1c16d83e0c6bd2356bf3257fcedcccadfd05c3dbb
SHA2563243018f8d3f21ea0699ecce258dde161c899fb3d248eb12312ee2d540ab3029
SHA51297ea0697af504b98c14b1355df24f9e9f668cd59e9c44880f562dfe3cf183d92aadbbf07c9f2aa69161437c266631d638fc286b8d5b168a222b76e894cdca313
-
Filesize
6KB
MD5742f89a1d207c74b41df4e3396f1752a
SHA1c4caf297dc4249c7ec274c721dd78857749f3e8c
SHA25625ecd9c53faefe49a11001f2b738a89f9bbb698f45981b4c4fbd372d8a791f92
SHA512a74a66aa346770d89c15539c284ce9dc200011b05f0e92bf0ec822a4e0083074bec9dd1c1609d55e34368041a6b7f295700b8dd7ffdd5b4edd8fba0296ee8b6b
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666