Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 17:49

General

  • Target

    65a6a7eb140ac1c9ef0036af6880645a.exe

  • Size

    288KB

  • MD5

    65a6a7eb140ac1c9ef0036af6880645a

  • SHA1

    495a0a275b06b7db09b20adf32085d143143c590

  • SHA256

    20bfa115a8606b230d4e6a1fc7ca7fda8f623b0a783a0cfbfa09201a8ba63909

  • SHA512

    5595ddaafbb64f169a2af0b55ef96414b325505ae40c5aec169be0a8c2bfadf2e3dc594714f89829a8597de479cda1b746fb3784bc7f3632c75158e26a162795

  • SSDEEP

    6144:wejcki1BSRm6W2k5F0f2t6b+vClRHUcivtJOkRGP07ByaB22U9F/R:wejckifOm67oFZt6KqlKRvtJOkRGmwtJ

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 17 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\65a6a7eb140ac1c9ef0036af6880645a.exe
    "C:\Users\Admin\AppData\Local\Temp\65a6a7eb140ac1c9ef0036af6880645a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\jfj.exe
      "C:\Users\Admin\AppData\Local\jfj.exe" -gav C:\Users\Admin\AppData\Local\Temp\65a6a7eb140ac1c9ef0036af6880645a.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2196
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\jfj.exe

    Filesize

    288KB

    MD5

    a73e1620b8278f3a9d40e362654556cd

    SHA1

    26edc08f6e04419ad39c9d5431727af959e866b8

    SHA256

    2f2f860bdf4a0e1984422e9abedfadbcf64fbdd5c642361f55116e007c3dd2c4

    SHA512

    8eeae100ab705708c03b66f85cf982645447b40b5a1466d958ff78a9d8430a9638ae888f54d883ec9ef6864d2d1671baaf2a22231ee637a1872b4e7033b17bc2

  • \Users\Admin\AppData\Local\jfj.exe

    Filesize

    41KB

    MD5

    636ff03b241e36047f7e42f55b28dd8d

    SHA1

    6c40b90a9cf451ef72305046e58c53d1e741e867

    SHA256

    b57a852da09411bb066b6fde6e8e50814d782fd129061944d14f2e575d959cb8

    SHA512

    5c95fb7936539a4fd1462fb53a2d9f3a545d0345d204c71f81f8aa2a3f3d8c620bbf157bcf20a6a7bdfd147fa9c96672aaf3bd3754edc8aae5ce8244df8bb4d0

  • memory/1976-51-0x0000000002A20000-0x0000000002A30000-memory.dmp

    Filesize

    64KB

  • memory/1976-25-0x0000000004000000-0x0000000004001000-memory.dmp

    Filesize

    4KB

  • memory/1976-17-0x0000000004000000-0x0000000004001000-memory.dmp

    Filesize

    4KB

  • memory/2196-41-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-28-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-54-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-52-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-18-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-19-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2196-20-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2196-22-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-24-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2196-26-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2196-49-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-15-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2196-30-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-32-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-37-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-39-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-47-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-43-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-45-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2948-0-0x0000000000220000-0x0000000000229000-memory.dmp

    Filesize

    36KB

  • memory/2948-1-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/2948-2-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/2948-4-0x0000000002350000-0x0000000002607000-memory.dmp

    Filesize

    2.7MB

  • memory/2948-16-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB