Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 23:52

General

  • Target

    jre-8u401-windows-x64.exe

  • Size

    64.4MB

  • MD5

    af1d24091758f1e02d51dc5f5297c932

  • SHA1

    dc3f98dded6c1f1e363db6752c512e01ac9433f3

  • SHA256

    e52a8d0337bae656b01cb76c03975ac3d75ac4984c028ba2a6531396dea6dddd

  • SHA512

    8d4264a6b17f7bbfd533b11ec30d7754a960a9f2fbef10c9977b620051c5538d8eb6080ea78e070904c7c52a6ce998736fad2037f6389ad4c5c0ce3f1d09e756

  • SSDEEP

    1572864:v7p5VFBCjL4FwlRN2Adn3aQrJlPVYIcBO7:vGTW63aEiIcBS

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 14 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jre-8u401-windows-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\jre-8u401-windows-x64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Users\Admin\AppData\Local\Temp\jds259419039.tmp\jre-8u401-windows-x64.exe
      "C:\Users\Admin\AppData\Local\Temp\jds259419039.tmp\jre-8u401-windows-x64.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2568
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2720
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Windows directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\system32\MsiExec.exe
        C:\Windows\system32\MsiExec.exe -Embedding 9938CFDB4E8639C9C4D9B600D722E949
        2⤵
        • Loads dropped DLL
        PID:2552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e8926c3ee9214ce6cd2e645963c9c9da

      SHA1

      79707fbe9fcab3dc0a4b8ba7e3f9f1fd973928d8

      SHA256

      db9fc2dce88ab403492030bfca6ddbf9e6c937e40e2a97569203afa744e6bb8d

      SHA512

      68e74d208f2be930c045a811bf59e042ca8571b806b425787875f1536d56ca5120a5e9a172570b9e7c156ba6c7e61bbe8202966ac6b838009b8f106cdd9910b1

    • C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_401_x64\jre1.8.0_40164.msi

      Filesize

      17.9MB

      MD5

      ec666ee81e9d8faa518451cab530e28d

      SHA1

      1094cfc15f25c4bd4f299aa8fb5563a70d378d37

      SHA256

      438852376f4852b8ef5029b9b0978f57a519b5e6011d9c7b9ebb7a9ccb2bd57d

      SHA512

      d85d4a3ccb4982c3fc254ae90a9102b5565e82a06c30740663fa376d6493c9e7f0b4fa286c6f1039872008f7200f06dd3a241ba7b4c2f0c9eb1003bcaab81da5

    • C:\Users\Admin\AppData\Local\Temp\Cab8363.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar94F2.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\jds259419039.tmp\jre-8u401-windows-x64.exe

      Filesize

      21.6MB

      MD5

      a7478b28b57a6512a65718d494267068

      SHA1

      12fc1f9a9084f9828997e139c3b1f9c683c42f5d

      SHA256

      ad8fec1e079d08872433d33685f12d25125a9b00b9890f5fcb82c0279e4a11eb

      SHA512

      5d380bf9ff40401aef5644b541a9f3b7ae5887aefc392145a8bf95ab60455c8a557a8761f56ea466a60ee8c53e13e994fa73d83fd6b43a62d36b5a0d5ea05e8d

    • C:\Users\Admin\AppData\Local\Temp\jds259419039.tmp\jre-8u401-windows-x64.exe

      Filesize

      17.5MB

      MD5

      7afc908ae434d93a8f132808586ae3eb

      SHA1

      d64d7b27d8b0000e658f5cd9e112a23541cb6e8e

      SHA256

      4e57aea1aa9451da4afef951b28dbfc301de71372b84c91a4723e3e7474984e2

      SHA512

      540116113c6fd770ff62266b9b59dfd71e4b79ccbd2e93f3ed094da871a10a7bdd6d3739b1ed1b97128874fb8e2847573a3353ff53a072fa6845eca4141db3b4

    • C:\Users\Admin\AppData\Local\Temp\jusched.log

      Filesize

      3KB

      MD5

      f8dc4addcc080733065b7a38bac858ad

      SHA1

      fb0ef9d4bd0a4a31abeaa3c0f6cc856a2272d646

      SHA256

      5af8b98f5824a53ccc059c892aac99969d8ce649dbbfd37410e4d6799ca3dec7

      SHA512

      573bf4fd546f95e8dd3b73a3e61260de14ce2d80ecccb8b3b4bd2cd9a0198802f778832f1b59f01ff9debce76a4280876874e4dc3ce2c35ae9a88f74b8680004

    • C:\Users\Admin\AppData\Local\Temp\jusched.log

      Filesize

      25KB

      MD5

      bfeef85ba3c17cccf880b115a3206c8c

      SHA1

      eb1ff86799f4b65586879e125d8d523440754aa6

      SHA256

      6bc41af82d61036a2c07b6176670cd6cada7325417eff67d82818ceb31daff60

      SHA512

      2ba64d37c7a57282aab15b76daad47c523cb8f38d9a99653826538376cc99ae54749390cf45de6fa85f5e232fe8a1d8454a5ff5708fc3fc12b745a92cffd7931

    • C:\Users\Admin\AppData\Local\Temp\jusched.log

      Filesize

      5KB

      MD5

      fee89daf64e21f486a12bc4ec88ac101

      SHA1

      20da6c2fc24fdf9473321eb105db443f3f059b2f

      SHA256

      09870510a1b9dbc455e8255b374ccbca9085c6a4346e57b2cfeaa424a9896750

      SHA512

      77bb850e7ded8474818782a7044d2ccc1451124fceb92f2096229d41bdba729405cae18793601c83ff323bc78bcf706f2f46b489a795953634587d00d18d9bdf

    • C:\Windows\Installer\MSIA2BB.tmp

      Filesize

      953KB

      MD5

      64a261a6056e5d2396e3eb6651134bee

      SHA1

      32a34baf051b514f12b3e3733f70e608083500f9

      SHA256

      15c1007015be7356e422050ed6fa39ba836d0dd7fbf1aa7d2b823e6754c442a0

      SHA512

      d3f95e0c8b5d76b10b61b0ef1453f8d90af90f97848cad3cb22f73878a3c48ea0132ecc300bfb79d2801500d5390e5962fb86a853695d4f661b9ea9aae6b8be8

    • \Users\Admin\AppData\Local\Temp\jds259419039.tmp\jre-8u401-windows-x64.exe

      Filesize

      14.4MB

      MD5

      2a964d4384fafd82f119e53a2953e38a

      SHA1

      15e72d98740ec15304e42b416961293be495da45

      SHA256

      421833fbfae98d651d156c88c692346e8a79035f8f1944ae8e829b48637987ec

      SHA512

      c8723bbcd004e90300e8106b38bc362e4daddd06c11554ee54ce7b692887ed49e0129cc2103819d1a015087ef5eb87a3d463f8ee430dfa46b7cc97827c2d3f58

    • \Users\Admin\AppData\Local\Temp\jds259419039.tmp\jre-8u401-windows-x64.exe

      Filesize

      156KB

      MD5

      6abd528d61eae703b55171e771c0f438

      SHA1

      d42b03986d78d55995bd38b5a3a7e35ff4376eb3

      SHA256

      934c79a9f9ce16993e08eada342bfd5e02dfa861fe020688a6c1a8831d00b02a

      SHA512

      1fea7ac52c5ecb14c606ef42062052e29052fa4334a2c77cf0f3eb15831aeac0cf969b1d7a93066043251e5d62d29bc1431414646347c80dbd348e0f3d341fc9

    • \Windows\Installer\MSIB4DD.tmp

      Filesize

      935KB

      MD5

      e38a4eaf80c6649703fd4daff808b94b

      SHA1

      d530c7ed5257392dcfc8796ea8ed7bfa1b5a8d89

      SHA256

      66b899d23fbe4ed0af45454d9e57cad84fada0d6c940e358b07c535bdfad17a9

      SHA512

      bfa850723f8aa0b8c01030b79835196ee87af168447dd06912f79f0b7f30a12640991cd529d7be1b7d969e11fb3f71917b087109f4075f3428bc634cd8f50d3f