Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
8ca1ecf268ce85ceb8855ac8e2c55414.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ca1ecf268ce85ceb8855ac8e2c55414.jar
Resource
win10v2004-20231222-en
General
-
Target
8ca1ecf268ce85ceb8855ac8e2c55414.jar
-
Size
123KB
-
MD5
8ca1ecf268ce85ceb8855ac8e2c55414
-
SHA1
40cb27e69cff3e53a252a9d539fa60314ac4e3a7
-
SHA256
9d4b71f7a7886232ed1977d2c92870637ffc08dba838b20245ad60aeb7d2b102
-
SHA512
9ddaebdade5d99b2a12e0753a7dd7f4a81857b8654461bfe2119cade2665f5db33a769788a3d72f2582a20ba7fe736033882cc279c16759a14c025b920130605
-
SSDEEP
3072:ZLLB9Vo35PRErXjMOKCaOgyeAz1+i1GMcU6A7Auka/:ZvLVo3TYMtZA+HA6Ja/
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cTmNhYTLpQ.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cTmNhYTLpQ.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\cTmNhYTLpQ.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2856 2504 java.exe 29 PID 2504 wrote to memory of 2856 2504 java.exe 29 PID 2504 wrote to memory of 2856 2504 java.exe 29 PID 2856 wrote to memory of 1076 2856 wscript.exe 30 PID 2856 wrote to memory of 1076 2856 wscript.exe 30 PID 2856 wrote to memory of 1076 2856 wscript.exe 30 PID 2856 wrote to memory of 2064 2856 wscript.exe 31 PID 2856 wrote to memory of 2064 2856 wscript.exe 31 PID 2856 wrote to memory of 2064 2856 wscript.exe 31
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\8ca1ecf268ce85ceb8855ac8e2c55414.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\_output.js2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\cTmNhYTLpQ.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:1076
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\nmiznunwz.txt"3⤵PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5685b1b2952c8efe8584d692840416ebb
SHA1d52696d12e7aa7b5c3757bfc0d524e11a527edba
SHA256a0468409b7c7800ce0b1df997097525357bb2b93686afba5e5f82dd03667c00c
SHA5127b173df0ef8b2045f65980e2ea657a544551b4809eb6d82b5eed829e5858fab4966e500912f193d2a6382974f2d1c775a93454f562a6a826d6a191dec7f39868
-
Filesize
88KB
MD5468ec549c270898563a0d61e42a3bd17
SHA16bbd046226d2a87abd4e24d9831e029d97f5e0c7
SHA256ba97fd311dcae06ced279a1a5503252c7c0986a28e4168f0f96b4afcbcb7f79b
SHA512e9071cd00f5c12810e08655f9dedd740fa3052132467a1596056d986a505d980fde4a0bac0d9ff573b630fd0c5b4aeec05b878bd3d05c549e9745fe26dbc8039
-
Filesize
195KB
MD59e872de7115891e5eea6c64be9164ad9
SHA1c279eb494fbf5cd0a398fb02c4b10e8728b4198b
SHA256019a6c3f10ef4440d4c08462eaca4acca8f58e16bc375c0483336368bc919457
SHA512b9d651f7f4bc7edbd4f66c0acad209bcbc3268a648a02cff5b19b5f30eafe2c6e1ade7ce617f4b16433585cf3aa3f13a25f665a7541371af0e587c2a472453db