Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 22:54

General

  • Target

    0002455510da982d0474ed8aaf5f7756_JC.exe

  • Size

    420KB

  • MD5

    0002455510da982d0474ed8aaf5f7756

  • SHA1

    56c9d904830c86e6a830b88d5e3e254fc7c3fb76

  • SHA256

    68ff6814dafe9fd6bd25e9b4c2f35417d3b6574ae2fecd069163e1d4c65b5c73

  • SHA512

    a45cc05a91c1a3e57d584b5c8cd535fe65773be5e41d85659b0b28d2cc0c0475dfa16500ccbde1d41cebf394f1f07c92ec00816d7229571ffa04f3d49d5805c8

  • SSDEEP

    6144:gdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nqx:G8kxNhOZElO5kkWjhD4AF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 17 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0002455510da982d0474ed8aaf5f7756_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\0002455510da982d0474ed8aaf5f7756_JC.exe"
    1⤵
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\OEMJMYI.EXE
      C:\Windows\OEMJMYI.EXE
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\MLD.EXE

    Filesize

    421KB

    MD5

    3336f45b8e83c19830be42f6c1884928

    SHA1

    7411d972b33573f1f8f185e1b38740915a779b4f

    SHA256

    fb6cf6663d40875f16f4e85a62f66274835a93e9c85b8230e7bc58a07f19b5e0

    SHA512

    ad5e70e2aba241d9cabcaeccd58d62eb1861653b1dbd03de32ed1e995deaa18688d9d3d105b74e2f7fe377f454f164ee15424836266cbb97bb24af9d3afd500a

  • C:\Windows\OEMJMYI.EXE

    Filesize

    421KB

    MD5

    1134189dd71faf42358f54abc664a01d

    SHA1

    5970008aaa0a52abe7514c6154789ca5e4cf1538

    SHA256

    e67ed284d73b88f398d3e48963e5962903423609672cf141d27024dc213fbf5b

    SHA512

    02a4c5342ecfdcd909793aae22dd1fa978d16cd9b7b3538a73695c35f79cc9f60410baf10e613d2c2c8e1e4a72885a27564e8a53125a6cdbbb08e7a45c520a89

  • memory/1816-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2780-24-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2780-25-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB