Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
771443f447689ff3cd7a648b15eb24c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
771443f447689ff3cd7a648b15eb24c3.exe
Resource
win10v2004-20231215-en
General
-
Target
771443f447689ff3cd7a648b15eb24c3.exe
-
Size
199KB
-
MD5
771443f447689ff3cd7a648b15eb24c3
-
SHA1
1df1b6ca539261abfda07a5005821f1158dc62fe
-
SHA256
003fd8ad5378d0ad46a956412d226768e54424492548754a12a271c8d0882933
-
SHA512
fd4d94d54da0ab5225da91b0a86aff9d03655e7b0ad07ac7577f874deb9093f62ac291e85c09f27a3106901ccfeef84e4d9e3013f4519609dcb9ccdcb8a83a1e
-
SSDEEP
3072:t0qBn6/HBq3qAdGhS4k5p5pU4T4B+jca8Wz/9DMFIW925pOLA/hmqVvTVLC4HTkv:t9+Bq3qnop535+Wzmw5pSqpheLweV
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 jjd.exe -
Loads dropped DLL 2 IoCs
pid Process 2976 771443f447689ff3cd7a648b15eb24c3.exe 2976 771443f447689ff3cd7a648b15eb24c3.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\Content Type = "application/x-msdownload" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\DefaultIcon\ = "%1" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\DefaultIcon jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\ = "Application" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\jjd.exe\" -a \"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas jjd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" jjd.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\DefaultIcon\ = "%1" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\DefaultIcon jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\jjd.exe\" -a \"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open\command jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas jjd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\start\command jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\DefaultIcon\ = "%1" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\start jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\Content Type = "application/x-msdownload" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\DefaultIcon jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas jjd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\jjd.exe\" -a \"%1\" %*" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas\command jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\ = "Application" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\Content Type = "application/x-msdownload" jjd.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" jjd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\ = "exefile" jjd.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2976 771443f447689ff3cd7a648b15eb24c3.exe 2976 771443f447689ff3cd7a648b15eb24c3.exe 2976 771443f447689ff3cd7a648b15eb24c3.exe 2976 771443f447689ff3cd7a648b15eb24c3.exe 2976 771443f447689ff3cd7a648b15eb24c3.exe 2976 771443f447689ff3cd7a648b15eb24c3.exe 2976 771443f447689ff3cd7a648b15eb24c3.exe 2976 771443f447689ff3cd7a648b15eb24c3.exe 2976 771443f447689ff3cd7a648b15eb24c3.exe 1720 jjd.exe 1720 jjd.exe 1720 jjd.exe 1720 jjd.exe 1720 jjd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2684 explorer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 1720 jjd.exe 1720 jjd.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 1720 jjd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1720 2976 771443f447689ff3cd7a648b15eb24c3.exe 28 PID 2976 wrote to memory of 1720 2976 771443f447689ff3cd7a648b15eb24c3.exe 28 PID 2976 wrote to memory of 1720 2976 771443f447689ff3cd7a648b15eb24c3.exe 28 PID 2976 wrote to memory of 1720 2976 771443f447689ff3cd7a648b15eb24c3.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\771443f447689ff3cd7a648b15eb24c3.exe"C:\Users\Admin\AppData\Local\Temp\771443f447689ff3cd7a648b15eb24c3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\jjd.exe"C:\Users\Admin\AppData\Local\jjd.exe" -gav C:\Users\Admin\AppData\Local\Temp\771443f447689ff3cd7a648b15eb24c3.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1720
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD5771443f447689ff3cd7a648b15eb24c3
SHA11df1b6ca539261abfda07a5005821f1158dc62fe
SHA256003fd8ad5378d0ad46a956412d226768e54424492548754a12a271c8d0882933
SHA512fd4d94d54da0ab5225da91b0a86aff9d03655e7b0ad07ac7577f874deb9093f62ac291e85c09f27a3106901ccfeef84e4d9e3013f4519609dcb9ccdcb8a83a1e