Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
7d99983f89dc32fda43d776cb33e3357.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d99983f89dc32fda43d776cb33e3357.exe
Resource
win10v2004-20231222-en
General
-
Target
7d99983f89dc32fda43d776cb33e3357.exe
-
Size
35KB
-
MD5
7d99983f89dc32fda43d776cb33e3357
-
SHA1
8cc20c7c9c44458ec7b2c776e57f4e25fc8dec58
-
SHA256
12c42cae4fcababe097a8d3ef2aea22e7c62b8ad61a5cc9c52eff1d11a7f4ea8
-
SHA512
8f9a26f2161f7d392de7639b587f6b30ed3fcd2bd3407fba612650ef2e32c7515e446dd61e64460552a6c709852474039a904cbcaa66088ffb2e37272ba80c2c
-
SSDEEP
768:NqQoj/dSzNVQ1mDNJWbKEdBMQXQ3Cn4eQQWrcwxZ:MQoj/YNJcAQW5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 7d99983f89dc32fda43d776cb33e3357.exe -
Executes dropped EXE 1 IoCs
pid Process 4664 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-19\bin\jusched.exe 7d99983f89dc32fda43d776cb33e3357.exe File created C:\Program Files (x86)\Java\jre-19\bin\UF 7d99983f89dc32fda43d776cb33e3357.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4664 4424 7d99983f89dc32fda43d776cb33e3357.exe 62 PID 4424 wrote to memory of 4664 4424 7d99983f89dc32fda43d776cb33e3357.exe 62 PID 4424 wrote to memory of 4664 4424 7d99983f89dc32fda43d776cb33e3357.exe 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d99983f89dc32fda43d776cb33e3357.exe"C:\Users\Admin\AppData\Local\Temp\7d99983f89dc32fda43d776cb33e3357.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Java\jre-19\bin\jusched.exe"C:\Program Files (x86)\Java\jre-19\bin\jusched.exe"2⤵
- Executes dropped EXE
PID:4664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
35KB
MD56a799ac3988c8f21c224a3d2041a7324
SHA18b9f993103697d166764844d616857f2b74df83e
SHA2568c8f6768017e6cb02f94773b6d3e3be41cba13e5b768ec126723687b5e7ed526
SHA51281876530c44a07e21bd8a12fe3369b38fc4204b6a98e92e0845726c4b3b726023fb7ce5f924bdd4c81ecb375b5f516dad8a21f18cba2c75eb79781e0cbf3c457