Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 22:53
Behavioral task
behavioral1
Sample
1c5d3b71eeb848580811ef1686aced85_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1c5d3b71eeb848580811ef1686aced85_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
1c5d3b71eeb848580811ef1686aced85_JC.exe
-
Size
3.6MB
-
MD5
1c5d3b71eeb848580811ef1686aced85
-
SHA1
8b5a7199ec75448026a865c0795462866816aed6
-
SHA256
c19b2dca3a31a7ac71dfca6929be31122383452120d42f03502613dfce714faf
-
SHA512
0e01011e51c20f6f467de945a3fb4326b72ff348a3aba9e0f0ad74c587297b304512cf3a3d1b9929daf68de64fd3f81984fd296f2576d5627b912e6c99fa3f10
-
SSDEEP
49152:3jMDkYOMwwnMb4PmyVZwnNTBkbtL2tLYcY/0KPzvoS7UKPzvoS7y:zxYOXwnS4rV6wV2Vhizwshzwsy
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00070000000231c6-11.dat aspack_v212_v242 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 1c5d3b71eeb848580811ef1686aced85_JC.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 1c5d3b71eeb848580811ef1686aced85_JC.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\serialver.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\serialver.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe$ 1c5d3b71eeb848580811ef1686aced85_JC.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe 1c5d3b71eeb848580811ef1686aced85_JC.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 1c5d3b71eeb848580811ef1686aced85_JC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4608 1c5d3b71eeb848580811ef1686aced85_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c5d3b71eeb848580811ef1686aced85_JC.exe"C:\Users\Admin\AppData\Local\Temp\1c5d3b71eeb848580811ef1686aced85_JC.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51c5d3b71eeb848580811ef1686aced85
SHA18b5a7199ec75448026a865c0795462866816aed6
SHA256c19b2dca3a31a7ac71dfca6929be31122383452120d42f03502613dfce714faf
SHA5120e01011e51c20f6f467de945a3fb4326b72ff348a3aba9e0f0ad74c587297b304512cf3a3d1b9929daf68de64fd3f81984fd296f2576d5627b912e6c99fa3f10