Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe
Resource
win10v2004-20240226-en
General
-
Target
c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe
-
Size
8.4MB
-
MD5
48c91eabf47b255a535ecfcd0b8dc483
-
SHA1
5842ee20e5edfde37c4aea19daaca6aa5de7de9c
-
SHA256
c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4
-
SHA512
b1a03c8ea757bc7c1a14dccb4c23b2ba0b9d1cf8b9a2d285dd371abd2181e40faed63db7e39eea04f855333202df5a050716931cc3fd6aa8b0734b67ebe9708c
-
SSDEEP
196608:Iih1GESu5gTe3p2VLyM0/f7Pnj57ymavlb+FX9eUO:PvmTe52VGM2/j57ym2b+FXIUO
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 4260 lzma.exe 832 lzma.exe 4168 lzma.exe 2792 unpack200.exe 4320 unpack200.exe 4600 unpack200.exe 2628 javaw.exe 3856 lzma.exe -
Loads dropped DLL 5 IoCs
pid Process 2628 javaw.exe 2628 javaw.exe 2628 javaw.exe 2628 javaw.exe 2628 javaw.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2000 wrote to memory of 4260 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 90 PID 2000 wrote to memory of 4260 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 90 PID 2000 wrote to memory of 4260 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 90 PID 2000 wrote to memory of 832 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 92 PID 2000 wrote to memory of 832 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 92 PID 2000 wrote to memory of 832 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 92 PID 2000 wrote to memory of 4168 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 94 PID 2000 wrote to memory of 4168 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 94 PID 2000 wrote to memory of 4168 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 94 PID 2000 wrote to memory of 2792 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 95 PID 2000 wrote to memory of 2792 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 95 PID 2000 wrote to memory of 2792 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 95 PID 2000 wrote to memory of 4320 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 96 PID 2000 wrote to memory of 4320 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 96 PID 2000 wrote to memory of 4320 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 96 PID 2000 wrote to memory of 4600 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 99 PID 2000 wrote to memory of 4600 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 99 PID 2000 wrote to memory of 4600 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 99 PID 2000 wrote to memory of 2628 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 102 PID 2000 wrote to memory of 2628 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 102 PID 2000 wrote to memory of 2628 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 102 PID 2000 wrote to memory of 3856 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 103 PID 2000 wrote to memory of 3856 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 103 PID 2000 wrote to memory of 3856 2000 c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe"C:\Users\Admin\AppData\Local\Temp\c68601cd8867129cb1d03742a1db03eff943f3e17b50d2e8c4b19d1579f89fa4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\lzma.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\lzma.exe" "d" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\verpatch.exe.l2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\verpatch.exe"2⤵
- Executes dropped EXE
PID:4260
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\lzma.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\lzma.exe" "d" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\JWrapper-JWrapper-00019224260-archive.p2.l2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\JWrapper-JWrapper-00019224260-archive.p2"2⤵
- Executes dropped EXE
PID:832
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00019224260-complete\lzma.exe"C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00019224260-complete\lzma.exe" "d" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\JWrapper-Windows32JRE-00018576302-archive.p2.l2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\JWrapper-Windows32JRE-00018576302-archive.p2"2⤵
- Executes dropped EXE
PID:4168
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\lib\ext\sunpkcs11.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\lib\ext\sunpkcs11.jar"2⤵
- Executes dropped EXE
PID:2792
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\lib\jsse.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\lib\jsse.jar"2⤵
- Executes dropped EXE
PID:4320
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\bin\unpack200.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\bin\unpack200.exe" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\lib\rt.jar.p2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\lib\rt.jar"2⤵
- Executes dropped EXE
PID:4600
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\bin\javaw.exe"C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\bin\javaw.exe" "-Xshare:dump"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628
-
-
C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00019224260-complete\lzma.exe"C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00019224260-complete\lzma.exe" "d" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\JWrapper-Remote Access-00019225649-archive.p2.l2" "C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\JWrapper-Remote Access-00019225649-archive.p2"2⤵
- Executes dropped EXE
PID:3856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\JWrapper-JWrapper-00019224260-archive.p2
Filesize1.1MB
MD5089502f3f5624218fa559d8c94fc17e9
SHA1586857cb6762732a0116219fff536399220e1e83
SHA25679f6fed58712b00ea5a1b9962cf9853e9adc89924aa6a57d878c1ad65862a809
SHA51285f30fa66332389ab7f3219363fe611c03186b428aaebcbdf488e2eb51f66bb2b952de9e8ea22f5c32b433a7797469a9121bb573c83c3d9f576be44f2fa57ce2
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\JWrapper-JWrapper-00019224260-archive.p2.l2
Filesize379KB
MD503b08024d91cf68ac9cfa7733878c808
SHA1a0d737afaab6f2e21e0923ae1209fc6e7491e9ad
SHA256761d1e7ac229b70cd0c595d33a81d027be59f42e287917f5eeee744ec7c06a9b
SHA5127e25d8f1c3ed6f2069cfa62b8d2461988049a2ac0df191ffb5ebfd0b861014f4837334bc28f21a5fff8b9bd5ff774d5e0af6f5bf998baaea126b01e4b1fa7eb1
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\JWrapper-Remote Access-00019225649-archive.p2
Filesize2.2MB
MD535b32207b552502fdd51f3764395ff59
SHA1600e7ab60b67e3cb3e9bd756e3758e9289497688
SHA256b3b64d193c3b45797b30650f1a2cabcb1bf2a753b41ab01667dd23ed8a1491dd
SHA512a1010c196d283729ffe1b5c543e6a874cd7436a49df7ddee27e6c68714f0c008c0d85b90fb4e494f6d8bf43a70f3ae527a88d542333aa3c32373e1d4d47f6074
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865231-0-app\JWrapper-Remote Access-00019225649-archive.p2.l2
Filesize1.6MB
MD5f360794c0b0ff2226ccb634f8f2483db
SHA118758df6029f6ce4f5958a1b390e30fd6cd98cfd
SHA256a5e271f4aa3569158114a591ef0c71dcfbecbefa1236211fd599f38452dc15e7
SHA512d93ad1ee59140ae3dc5ee4a4fc569abaa1b9960520bccad42dd5f065a6c4e9c71d3771b8675316e4dfcbe389be6a66f32f14a079d9ad6638f8c05789883ec189
-
Filesize
71KB
MD5e59aa0e52e93c781dcdab8ad7cc4054c
SHA11be9c2d8b48d6e0c8a7cab6013cc36ea42ec421e
SHA256410bfdaddee3767151296fe4f16052c39546151916f05bbe4ae1c6b698b18f0f
SHA512d0be3580640bb2cca0c097ec2154132eeefd2b2b4b0e45027cc303c47a42f5c545d5f50182c70a69b5d1673112d24f8ae320d097d7034e810dbc0a5128b09050
-
Filesize
16KB
MD50f01ede304c8199e4b56b847be0787e0
SHA1a73f8dd25773469a1fd3cb873d2af3a95bf46fd5
SHA256f719964e71b47116e87fdea44a50425e462fa9036e43d7badec624f36fe86d9d
SHA512c46acf58ac2128576cf5996724f7b759092d0e705efff641a5feb5385f1a0078b78a9d044c51a80592bb90b137a633f9453105619b7a619389744a09963bbfb7
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\JWrapper-Windows32JRE-00018576302-archive.p2
Filesize14.4MB
MD58a98e0b4a05b8d638c958ebae9b7acfe
SHA1f582f767e83dbb0a49f2e3ecc3e7e80c6c1470d2
SHA256ad65470672d0b55ac853eef2c9f7883df7a3552ca25eb767aa30a08caaca9342
SHA5125da47594a55a35a30f596b55de2dd4e64082a77c67f88988cf78916cbca70bdb35bff594816f7efe2e7b41c39ecc0791558b4aaafd123255655fe6341afb3f11
-
C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1709865232-0-app\JWrapper-Windows32JRE-00018576302-archive.p2.l2
Filesize6.0MB
MD5a939e212256a5ee3864f8660f4dadf8d
SHA1c0442ae26df16c4522e951ef3a881308887b36fc
SHA256435f7d0e79d888e988cc760e368c7520b8f68f3be358f07a09cae959cca09c9d
SHA5129255614014975e2f76fc5946d8b7b8b88bf7d10fa3722126294b733db0100c7e9a6f5e57d9754e2fd1a8fc561abb3b5fbb7e5b1c2d710dd498e463deefc1ad1f
-
Filesize
1.6MB
MD5c9c4c710990b34b3c851e76a56360fc9
SHA1a1d7bbf2e6f198b2af725eb469b6d41d6ac979c1
SHA256b6ed5d2218569e924930dd2a84536001ef34f89698b6c65140f05b1873266434
SHA512d03f1827b5f3ad687a7f0664c537a8dfe090d97cce67f3d7970780777497b4fd1cbbfe893fbed1d3d4e39ed71a27b547c388685ea8d1c6fdbd673ecd87dad8b6
-
Filesize
32KB
MD57f4f5d189ec48566d9d8c2ebaed68c74
SHA18ba4ab69b6a453640708ba8337e53d01ce041834
SHA256ad9a3a3949742995b9b2b302e99b9a15a5c0211acccbdf4d6a9f86a69a3f305a
SHA51252b461a23c4377974494a1b57f49e8c32e072e933be59f36900290f518504f7d42189e22aab7a51dcda128d0606bcd9c0a85404340313ac322e39db36828da13
-
Filesize
116KB
MD53b3613ae9a31e5099ff803b8c858a86d
SHA15cc6c08550cd2f4ef6d37d521c7891051413f16d
SHA2565a5e216f287cbcaf7a4ba8ccb8fcb3dae0b05378d89ba6a70f1d50b394306796
SHA512ed360d73fcc2362129ff4e2c52f8fdf84970598f49be081740e7ed23d23fa8cdf7a01d13cbe2b8cff3fa0d2ecc7455487f98e827eabc2c0d76037e1d4afef365
-
Filesize
52KB
MD5141c0ddc4b7aa9287d1dea52c9525445
SHA1b01e93615748020869be5f7dc73be6803ac18619
SHA2569dee589ab11824cf051afbf5ba0d30e38a464571d23edb14f0ea9b6bdf9fc57c
SHA512c5d7c14e11ea613b1c4b2a796254142136112b5682fccb1ebafbbc014601e5b103f8ab7a5d3a9d4b319a379741fb0bbffa6a214a142931e4f17aecdd54112a54
-
Filesize
124KB
MD50ac355d4114bcd53ad9aa4a01055c44f
SHA13a7c3c936a73de1c414b08391b37fe9c106990da
SHA25680b00b9c76c491322779d0c2ef3fb0bb6d9609b7a73eb85e1bb08ebb76c049aa
SHA512f18886f522c226e379166a7dd9cae600f000b696aa31ac9c7e54e76b7a74de226127637eb7cd8de3bb454883a0b82cb1b6236f8180296e6dc42d8a228e6933b4
-
Filesize
48KB
MD595c10f3184ed7aa45709f7cd70b49589
SHA11096dc0c79d201b7bd77e0399c6b8d86bc1f8a6f
SHA256e6f4b6e25a2bc7fc03a73032c60138410b30ac528c7d10da87ea612e52a7b736
SHA512211c522ccdeee5145cf1cddc9806c79915d16ac1d2614c3bcf75d776d61c314c66ebef53f90aae5218ad472c15fba12f0ad0d19f0dfbb022fd36462e480de637
-
Filesize
60KB
MD519984073548bc33fc67c04aa277cdd44
SHA164189f2f71e40ae2794dcfb2df53056a82aa33c2
SHA256f450c1a55a143d35b8b330c7538c22b8781d729aa947e27cbc2afc4e19434686
SHA512b08ac43a0c6f12301339c30717908989ffe8bc3cf3889bcd347e83dbdc6fb21150d715da8525edd800015122c417da0870d08affbf35b5496410e36b913c5022
-
Filesize
76KB
MD5ef2f77d23cd37746737f2f34f953b27c
SHA1d3fc136fcf5421f31bf379a57f55fdb76450461d
SHA256c5f11846410444f7eba84742a71d0693f4e25439af58e1ce7db41e21b7806e77
SHA51266a1729bddc5a8dc8bc47c00c9a59f1d99f282c42dc177d58f11d283437209764e795168aaac03b2c00aff013d1329163faa6406cca8b08cfb6a8679a57e4bb5
-
Filesize
695B
MD58d52e756ca8cbe07741e1640b38a0f87
SHA1bde0eca45c0d1b0be7250245eaa55487384c8bd3
SHA256db32e24f9ab72c2a30e2cd2f80300b3640b8f04d2cf7dcd86fb15261ba46983c
SHA512f1faa89f350da7d656d80aa8642e773af4cc5481719b627f3b2d313b03845a78b4700c77e25583e4157fda599745e2f4a06dd71adfb64d7294bfb9ef6e2865c6
-
Filesize
80KB
MD58bfb4f2b5a7db5c2f66029cebcda61af
SHA1544317c36b07e20b091ed1c276a1fba20719a696
SHA2568c18142a4f95801050b8bddb632fa46b6c77f8937733b1b352ae71fde0d5f0ea
SHA51206fc3734cfd6778b1f389fb111079ffd959798cfffcf799c563f228c70280373f7e412d2258f0abeeffe0979b3a4295ed123c0992e9fe724c5e6505e14db096b
-
Filesize
474KB
MD53902fa042a832f116c4bbdb8ac260396
SHA1bbf56369190cd403dffc6114121bc93ef1f8bd94
SHA25687d8858ed9ba36a65a71410816d041f878d61732be37c00a5521596d5d729b4d
SHA512f79c93b40d109525d65b008d495751aa85ca9b43e32697028979da597c9ea5d265fd7b23b4979d1e874555768e375e56ada9cdafce776a2acfcb934e94be9706
-
Filesize
115KB
MD541789f3bfea0465b6b5dfdbe133fe342
SHA10061d61370170afdc3984d2e0016c5b8d10b3946
SHA2563f1931393c34b8828c37668bb34891cabce89a4caad9d2a1e8ad07b0c2f205c6
SHA5122f6f8d579d9806d8b8a6c2e582e065a889c02347f8141e79c02ba238d100a11e2a491f1f915fc95bb297b0be498a2e3c2267bc78d10b9578c40c11f53f166735
-
Filesize
3.1MB
MD5806bc262ed92d2574daf0543eeaa7ca3
SHA19ff91c4fb91e2c8ac0ebeb69ec7ce6ad6e6e3500
SHA25678bb5a5e069e1b96548fac8d48a9f63a5ece78a7a6a7c5d82b3bc2d30b1d9cef
SHA512f648cad9f0f9907fa2ab668a3bcfd79407383a83cf3a8dd0606b5edd936bdc1f0195f33ed9b3a4c1612c127ae69ea3b7e8c67018d57665054b8bd48a3dfb2b43
-
Filesize
1.7MB
MD5beb588de1d762005d51e61bf0f47036f
SHA1e2c005de86c080e12cfcd8950102c58d583f171f
SHA256bb550385b34176ef9eb8a4b8ca51f23ce421808f0a2981bc96b0bcab7dee1871
SHA512bd79fdcd8cc7eed29a2b7f6481c298bd68d6d3681fd9a4d4a25e1df93c3ed5f815b6fbb34b72f6b7829c75e32ea3582d97943b0919e4125ba96771f54dd1f102
-
Filesize
27B
MD57da9aa0de33b521b3399a4ffd4078bdb
SHA1f188a712f77103d544d4acf91d13dbc664c67034
SHA2560a526439ed04845ce94f7e9ae55c689ad01e1493f3b30c5c2b434a31fa33a43d
SHA5129d2170571a58aed23f29fc465c2b14db3511e88907e017c010d452ecdf7a77299020d71f8b621a86e94dd2774a5418612d381e39335f92e287a4f451ee90cfb6