Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
8cbd96172613aa968f3c3f77ca8caf5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8cbd96172613aa968f3c3f77ca8caf5d.exe
Resource
win10v2004-20231215-en
General
-
Target
8cbd96172613aa968f3c3f77ca8caf5d.exe
-
Size
92KB
-
MD5
8cbd96172613aa968f3c3f77ca8caf5d
-
SHA1
9b66b51211b709e227e236846e2ed5d8a575aa57
-
SHA256
51d44f65335a6ae50c85f955d85331f6fea02fbe8808743d5e3d6446ea0236a6
-
SHA512
50bf4e299c0cf62166db9d98aa2b39358d7d7515a43997798f30087dfcd2aad7c488488bf144c9e96fb6648c32940dc45dc82159cfca4ad3eea5396c5b0ad67c
-
SSDEEP
1536:OEonYIFv/8BJCMF/J2ApPN1osNTgTkTeTVT3TljMktqo3TkS+tyOSVTUjXiz:WTv2F/J2Apfpo3TkStz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jrwad.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 jrwad.exe -
Loads dropped DLL 2 IoCs
pid Process 2204 8cbd96172613aa968f3c3f77ca8caf5d.exe 2204 8cbd96172613aa968f3c3f77ca8caf5d.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /s" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /R" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /M" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /G" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /w" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /S" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /v" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /a" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /h" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /E" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /e" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /q" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /g" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /l" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /V" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /J" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /Q" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /C" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /O" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /i" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /t" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /Y" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /m" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /d" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /b" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /F" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /W" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /L" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /U" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /p" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /X" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /P" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /D" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /Z" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /K" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /f" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /A" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /k" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /T" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /B" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /I" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /r" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /o" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /H" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /j" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /x" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /N" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /c" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /n" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /u" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /y" jrwad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrwad = "C:\\Users\\Admin\\jrwad.exe /z" jrwad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe 3068 jrwad.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2204 8cbd96172613aa968f3c3f77ca8caf5d.exe 3068 jrwad.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3068 2204 8cbd96172613aa968f3c3f77ca8caf5d.exe 28 PID 2204 wrote to memory of 3068 2204 8cbd96172613aa968f3c3f77ca8caf5d.exe 28 PID 2204 wrote to memory of 3068 2204 8cbd96172613aa968f3c3f77ca8caf5d.exe 28 PID 2204 wrote to memory of 3068 2204 8cbd96172613aa968f3c3f77ca8caf5d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cbd96172613aa968f3c3f77ca8caf5d.exe"C:\Users\Admin\AppData\Local\Temp\8cbd96172613aa968f3c3f77ca8caf5d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\jrwad.exe"C:\Users\Admin\jrwad.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56658764c010b9397ebcde8f434ce990f
SHA152feded3e1487a4d95ebe1300a6422368d6fe88d
SHA256718fc1f5f182868c8a79fdef9fd7f8c1195ae657fd42f31db0fb482ed4fbbcfa
SHA512ccd7c72727fffde6204da01a5950815a3287c7c43ebe7d961353b5149253d9a22517cd90faad2bf226b01e5ac0e15bca8b6119aa9af1cbd74a7de2f3619d097a