Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
211s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
141fff49f3c43b14d0e597cdd7563b41.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
141fff49f3c43b14d0e597cdd7563b41.exe
Resource
win10v2004-20231222-en
General
-
Target
141fff49f3c43b14d0e597cdd7563b41.exe
-
Size
244KB
-
MD5
141fff49f3c43b14d0e597cdd7563b41
-
SHA1
5fc618279814a05fca3c083b4155fc6b0e1bba77
-
SHA256
199af3247f010ba14f088d08433b75bd5376a3016829157dbf4942bc2e3ff5bb
-
SHA512
8c51ac77484d527a9e4b7785db72f921628096822e5928ea54284bb35d8b249f8b5511963bee1b5a2b06dbe8bcf054b705e25675e4ee020f23271f9adb818ee5
-
SSDEEP
3072:8jYMSAOVRMcy1imsW7A0g3XDYHYTvZm3ov5Q4/cMIVH5bEvhSSqeLSqnjeD:er7KRFy1imdJgc4s2QRhH5IX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 141fff49f3c43b14d0e597cdd7563b41.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jumaq.exe -
Executes dropped EXE 1 IoCs
pid Process 2900 jumaq.exe -
Loads dropped DLL 2 IoCs
pid Process 1896 141fff49f3c43b14d0e597cdd7563b41.exe 1896 141fff49f3c43b14d0e597cdd7563b41.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /p" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /w" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /f" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /o" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /e" 141fff49f3c43b14d0e597cdd7563b41.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /z" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /d" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /b" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /k" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /l" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /e" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /u" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /v" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /g" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /x" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /c" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /n" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /s" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /m" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /i" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /t" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /y" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /j" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /a" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /h" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /r" jumaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\jumaq = "C:\\Users\\Admin\\jumaq.exe /q" jumaq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1896 141fff49f3c43b14d0e597cdd7563b41.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe 2900 jumaq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1896 141fff49f3c43b14d0e597cdd7563b41.exe 2900 jumaq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2900 1896 141fff49f3c43b14d0e597cdd7563b41.exe 29 PID 1896 wrote to memory of 2900 1896 141fff49f3c43b14d0e597cdd7563b41.exe 29 PID 1896 wrote to memory of 2900 1896 141fff49f3c43b14d0e597cdd7563b41.exe 29 PID 1896 wrote to memory of 2900 1896 141fff49f3c43b14d0e597cdd7563b41.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\141fff49f3c43b14d0e597cdd7563b41.exe"C:\Users\Admin\AppData\Local\Temp\141fff49f3c43b14d0e597cdd7563b41.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\jumaq.exe"C:\Users\Admin\jumaq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD534742cd990121b3431be228c0fb06ca1
SHA11dd77f73c7802a244389b0683b81d011a5d53fd4
SHA2567520a7c2829197f6ca369f0cff29b79dcaab02c152cc6751119258d21b5c5770
SHA51299146ce64c43ccaee013a11e3a249345d9dbb9062cca23af98650c24f0947b2b8b3d84b4e40919317a1e6905c507e3c04cdabf89274a6e9dbdede2693018f60d
-
Filesize
242KB
MD5b042b6df4336843eb0ea3b3970d39e20
SHA1effa2a26848fb2553e7b470e6a24b1ac8fa0d98f
SHA2563d6bdcd18b76cf91a712add53fc461fb8c34abec7c0fa868cd216f756de2a501
SHA51208494cab663b138fa0ede5036d75af9710d332375ea54b0d2ef6dd8eb549e0cd4dcb50bdfe506320291e5b4a2413dc01917be0d9ffb0775592878c85c835184a
-
Filesize
244KB
MD56eec9fb5afaad305d1b9d6f2f2642cce
SHA1d6440a3c49b390346e89900f7c72609a4b743478
SHA256f4f5b8cc86510791049fe120452bf90bd307f045fc6596d77ab426a7b2450083
SHA512afdbe7447f3ea9c35431c1e4ebd4497eae605cf2d50762b3bcdb16d7101c316d4cb93da1954e7f4c984706dfd1914dd815b400f9e1cd7d4a7abf07fb42f145d1