Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
2179d2e2fe043348627bfcd8bcc57b55_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2179d2e2fe043348627bfcd8bcc57b55_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2179d2e2fe043348627bfcd8bcc57b55_JC.exe
-
Size
1.5MB
-
MD5
2179d2e2fe043348627bfcd8bcc57b55
-
SHA1
686c86a9f710e6af022f7337f73c8cc44d10891b
-
SHA256
a15f1b4d01664bf77866a27c5d3a6f99fa808f0699f101bb402060a5c3ea3f31
-
SHA512
d8a03af1cbe8db25afef4c8791ee8fc5895d91a305587f4f558f69886093086415c4a7b8a6f4598ba0280ceef3a4fb53d6dca86bcde2fa06720d45d93a76c15e
-
SSDEEP
6144:l1/lKgzelZNQSBQGH/CSpWqTVmQ0ueF/mNyB:lcfBQGH6SfsQJCB
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened (read-only) \??\G: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened (read-only) \??\I: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened (read-only) \??\J: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened (read-only) \??\M: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened (read-only) \??\N: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened (read-only) \??\H: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened (read-only) \??\K: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened (read-only) \??\L: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened (read-only) \??\O: 2179d2e2fe043348627bfcd8bcc57b55_JC.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\Desktop\Wallpaper = "C:\\windows\\WallPapers.jpg" 2179d2e2fe043348627bfcd8bcc57b55_JC.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zFM.cab 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File created C:\Program Files\7-Zip\7zFM.exe 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\7-Zip\RCX59F7.tmp 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.cab 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.cab 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RCX5A46.tmp 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File created C:\Program Files\7-Zip\7z.cab 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\7-Zip\7z.cab 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\7-Zip\RCX59E7.tmp 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File created C:\Program Files\readme.1xt 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File created C:\Program Files\7-Zip\7z.exe 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\7-Zip\RCX5986.tmp 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File created C:\Program Files\7-Zip\7zFM.cab 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\7-Zip\RCX59B6.tmp 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\7-Zip\RCX59B7.tmp 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\7-Zip\RCX5975.tmp 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RCX5A76.tmp 2179d2e2fe043348627bfcd8bcc57b55_JC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\readme.1xt 2179d2e2fe043348627bfcd8bcc57b55_JC.exe File created C:\windows\WallPapers.jpg 2179d2e2fe043348627bfcd8bcc57b55_JC.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4764 4696 WerFault.exe 18 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Internet Explorer\Desktop\General 2179d2e2fe043348627bfcd8bcc57b55_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\windows\\WallPapers.jpg" 2179d2e2fe043348627bfcd8bcc57b55_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2179d2e2fe043348627bfcd8bcc57b55_JC.exe"C:\Users\Admin\AppData\Local\Temp\2179d2e2fe043348627bfcd8bcc57b55_JC.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
PID:4696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 7482⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4696 -ip 46961⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
1.5MB
MD5fce11fb1508c6ff84b8ff8e1714886ac
SHA1004b31dbf4ba95119dbf37b6bff70f1b5a00bb36
SHA2563d61daee3255534b045879f0ab0aee62f27752203f496ffd27bd28000b452bbb
SHA51259cc50af346f05a253a7139b048ab448723125ecf67360a8d49f87ac37feeea712372cb1f02ef9124e13cbeec10f3204cac90cf7e0cd7f75dfb11eec64bfafa9
-
Filesize
847KB
MD5c8f40f25f783a52262bdaedeb5555427
SHA1e45e198607c8d7398745baa71780e3e7a2f6deca
SHA256e81b44ee7381ae3b630488b6fb7e3d9ffbdd9ac3032181d4ccaaff3409b57316
SHA512f5944743f54028eb1dd0f2d68468726b177d33185324da0da96cdd20768bab4ca2e507ae9157b2733fd6240c920b7e15a5f5b9f284ee09d0fd385fc895b97191
-
Filesize
246KB
MD509712ea06275b8926d4f5c4633aaa9a0
SHA17e0158cf66d8c7042cb347198d069ba49a8778c9
SHA256dd8b722215e5aad242866ff7931adcb5f86ad81169083aa78f930cf651780d26
SHA5128db195480ba89e9c0bc9d218c202bd821f8b8d344f90327832d203454d4051a2e420e2279158d232a093d26096bab895b8881b30055ad8ea02ad6ae807834d02
-
Filesize
2.1MB
MD5b8d69fa2755c3ab1f12f8866a8e2a4f7
SHA18e3cdfb20e158c2906323ba0094a18c7dd2aaf2d
SHA2567e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd
SHA5125acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18