Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
4e040b1fdb9bd0b2b3eb5c36e83d1859.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e040b1fdb9bd0b2b3eb5c36e83d1859.exe
Resource
win10v2004-20231215-en
General
-
Target
4e040b1fdb9bd0b2b3eb5c36e83d1859.exe
-
Size
3.6MB
-
MD5
4e040b1fdb9bd0b2b3eb5c36e83d1859
-
SHA1
7f57063dece6c5db6cf19155929e8d6e712cbf10
-
SHA256
83be64a8bf71426091564b2b161775b4261937c62a3fe7a045045cdafd7e48fb
-
SHA512
cdf521f7862c1fca271fe74416e816b39cd34e89ba86c158e2b77c48993550492660df3318400d689aae5e4b7a024a831fc0bf11012ba158974c9ac79a0a6c37
-
SSDEEP
49152:3Vsc1vS99LfULqnstLet3LyGhKPgssSt2g5hKPgssSt2gB:3VsivdqnstLEfhv7StThv7StX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{BB1DEBA4-2D0E-4BD3-A275-B48259468944}\chrome_installer.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\MicrosoftEdgeUpdate.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\pwahelper.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.181.5\MicrosoftEdgeUpdateComRegisterShell64.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File created C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\dotnet\dotnet.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe$ 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 112 4e040b1fdb9bd0b2b3eb5c36e83d1859.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD54e040b1fdb9bd0b2b3eb5c36e83d1859
SHA17f57063dece6c5db6cf19155929e8d6e712cbf10
SHA25683be64a8bf71426091564b2b161775b4261937c62a3fe7a045045cdafd7e48fb
SHA512cdf521f7862c1fca271fe74416e816b39cd34e89ba86c158e2b77c48993550492660df3318400d689aae5e4b7a024a831fc0bf11012ba158974c9ac79a0a6c37