Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 16:43

General

  • Target

    7d99983f89dc32fda43d776cb33e3357.exe

  • Size

    35KB

  • MD5

    7d99983f89dc32fda43d776cb33e3357

  • SHA1

    8cc20c7c9c44458ec7b2c776e57f4e25fc8dec58

  • SHA256

    12c42cae4fcababe097a8d3ef2aea22e7c62b8ad61a5cc9c52eff1d11a7f4ea8

  • SHA512

    8f9a26f2161f7d392de7639b587f6b30ed3fcd2bd3407fba612650ef2e32c7515e446dd61e64460552a6c709852474039a904cbcaa66088ffb2e37272ba80c2c

  • SSDEEP

    768:NqQoj/dSzNVQ1mDNJWbKEdBMQXQ3Cn4eQQWrcwxZ:MQoj/YNJcAQW5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d99983f89dc32fda43d776cb33e3357.exe
    "C:\Users\Admin\AppData\Local\Temp\7d99983f89dc32fda43d776cb33e3357.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Program Files (x86)\Java\jre-19\bin\jusched.exe
      "C:\Program Files (x86)\Java\jre-19\bin\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:4664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Java\jre-19\bin\UF

    Filesize

    13B

    MD5

    f253efe302d32ab264a76e0ce65be769

    SHA1

    768685ca582abd0af2fbb57ca37752aa98c9372b

    SHA256

    49dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd

    SHA512

    1990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4

  • C:\Program Files (x86)\Java\jre-19\bin\jusched.exe

    Filesize

    35KB

    MD5

    6a799ac3988c8f21c224a3d2041a7324

    SHA1

    8b9f993103697d166764844d616857f2b74df83e

    SHA256

    8c8f6768017e6cb02f94773b6d3e3be41cba13e5b768ec126723687b5e7ed526

    SHA512

    81876530c44a07e21bd8a12fe3369b38fc4204b6a98e92e0845726c4b3b726023fb7ce5f924bdd4c81ecb375b5f516dad8a21f18cba2c75eb79781e0cbf3c457

  • memory/4424-0-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4424-11-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4664-10-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB