Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
681105abdc5d0c0343775b60daf355f0.jar
Resource
win7-20231215-en
General
-
Target
681105abdc5d0c0343775b60daf355f0.jar
-
Size
628KB
-
MD5
681105abdc5d0c0343775b60daf355f0
-
SHA1
19df3c8b66be211e6cb1cc01cf7c7eff5064fc8b
-
SHA256
9de696d1d6fb1228d3697b7be4e628d6489c4bc2dcfacc54b1fb282fe4fbebe9
-
SHA512
649fe254c397cace915c1348da5e8a6f35621a9a29ce720261e824fb91efe4d5b6276edb54ecdf9e606f2046c68b0ef5c5a1ed1a405585591f5856c9fe32893b
-
SSDEEP
12288:p9JFYoYph7hbhUItEv1GUSSoPwokLOqf5SEmkkjB0bCSoZiZ3znQBu:p97YoYt7oSjYOKSEUBwoZiZ3zQY
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UTKfCExmNp.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UTKfCExmNp.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\UTKfCExmNp.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2728 2712 java.exe 29 PID 2712 wrote to memory of 2728 2712 java.exe 29 PID 2712 wrote to memory of 2728 2712 java.exe 29 PID 2728 wrote to memory of 2668 2728 wscript.exe 30 PID 2728 wrote to memory of 2668 2728 wscript.exe 30 PID 2728 wrote to memory of 2668 2728 wscript.exe 30 PID 2728 wrote to memory of 2528 2728 wscript.exe 31 PID 2728 wrote to memory of 2528 2728 wscript.exe 31 PID 2728 wrote to memory of 2528 2728 wscript.exe 31 PID 2528 wrote to memory of 2832 2528 javaw.exe 33 PID 2528 wrote to memory of 2832 2528 javaw.exe 33 PID 2528 wrote to memory of 2832 2528 javaw.exe 33
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\681105abdc5d0c0343775b60daf355f0.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\_output.js2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\UTKfCExmNp.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2668
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\gsqjohklkx.txt"3⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files\Java\jre7\bin\java.exe"C:\Program Files\Java\jre7\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.494153801090133969081077647958244763.class4⤵PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD5781fb531354d6f291f1ccab48da6d39f
SHA19ce4518ebcb5be6d1f0b5477fa00c26860fe9a68
SHA25697d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9
SHA5123e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3308111660-3636268597-2291490419-1000\83aa4cc77f591dfc2374580bbd95f6ba_2a70212d-3249-45ef-9f7c-6c9a96910c8e
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
9KB
MD5ad0c7ddce8b698fe384a4fe713eee19f
SHA188f09dc796a1a1efccd3aff70f814df4f8e17a12
SHA256d0114eaf2ec37c2b7d65d87c8a8afcc536470d3a03c3ce3b09ad662e5ae969ef
SHA5129476eff03863804fba347947a2b41e12f60ced3001b6892ea73361d50c660613754be463b850bbe7261b663d8fff4f4df4245225b78f7189c141bce64ebd8847
-
Filesize
479KB
MD52bc77cbaca6f8ac04a0e4d698cf5133a
SHA134252120652ba3a20588aa557337538d21e5ed88
SHA256a87af64dfea31dd2e08ae33b9a595b37ed4fa1511f195caa498ee9d51199528c
SHA512fc14834e588ac87ea762a181ac12d1a59ca0fc60edb20ac1323493543760b641a6d9951c1bc3e04c66cf3692a284b793eff2cf9d8ab4050fb58d543780c24563
-
Filesize
914KB
MD554d7a9612b5b6ae8d92d1dee6afc77ba
SHA1566c13b7d4499a7d74e627ce818e10a65d9e1f47
SHA25607b0274fcfd6bba6f5056eff77692987aeea03ff2fe978a5b8c097e842df5c41
SHA512539491dc967fd97292d7f945d02e0c439566a8e805da0da3e31bef2313c8b20895828f7fa11a9801e5f6d638a565e45fe5fd1fbf3b579c6e27b8b31a76c3bece