Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
a3a883deb0920aca2147e9bc790bd29e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3a883deb0920aca2147e9bc790bd29e.exe
Resource
win10v2004-20240226-en
General
-
Target
a3a883deb0920aca2147e9bc790bd29e.exe
-
Size
156KB
-
MD5
a3a883deb0920aca2147e9bc790bd29e
-
SHA1
0b06feef7b46fbae18046fa10696641dcb7d2525
-
SHA256
8fca81f4bb1fd5c2657f10f1f3286be89a21fe7fec34298c967a8982f4357f50
-
SHA512
c8d37b803139c33a22ce16c89779a83236f60f1bbbb0be87dfb404fd51e323d5312a0fd5a7a19d2e509b69b0b21405cfb8686022b2074b33d1704c8846dda0d3
-
SSDEEP
3072:tKzhSpGbGb6JUBGnvZHpXtNLdZkkVYaZvLStH/h7yc2dV4oQZiE3T:YljbGb6JaGnvZZtNLdZkRapLmH8c2dnc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a3a883deb0920aca2147e9bc790bd29e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jmnay.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation a3a883deb0920aca2147e9bc790bd29e.exe -
Executes dropped EXE 1 IoCs
pid Process 3680 jmnay.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /h" a3a883deb0920aca2147e9bc790bd29e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /Z" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /f" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /C" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /d" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /c" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /F" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /p" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /E" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /N" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /P" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /r" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /j" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /L" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /S" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /x" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /l" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /h" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /B" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /H" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /u" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /T" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /D" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /Q" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /o" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /O" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /X" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /M" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /w" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /b" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /Y" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /i" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /m" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /q" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /t" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /s" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /V" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /z" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /e" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /a" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /R" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /W" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /A" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /g" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /U" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /v" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /J" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /I" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /G" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /y" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /K" jmnay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmnay = "C:\\Users\\Admin\\jmnay.exe /n" jmnay.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 a3a883deb0920aca2147e9bc790bd29e.exe 2240 a3a883deb0920aca2147e9bc790bd29e.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe 3680 jmnay.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2240 a3a883deb0920aca2147e9bc790bd29e.exe 3680 jmnay.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3680 2240 a3a883deb0920aca2147e9bc790bd29e.exe 91 PID 2240 wrote to memory of 3680 2240 a3a883deb0920aca2147e9bc790bd29e.exe 91 PID 2240 wrote to memory of 3680 2240 a3a883deb0920aca2147e9bc790bd29e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3a883deb0920aca2147e9bc790bd29e.exe"C:\Users\Admin\AppData\Local\Temp\a3a883deb0920aca2147e9bc790bd29e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\jmnay.exe"C:\Users\Admin\jmnay.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5e2e612b95265dc9fad221e14252e8e11
SHA11bd5676a20fd03828ab2ed1a9358a7597787b711
SHA25698d2aa146c2fe7d0f04087c015347c8498358b84d8dc0628845e4b8e299a5aaa
SHA5121916e07742f023d9787a4c1fab8b32a098ac9f16d8590785f4c0dcbd9d6e5a3a6eafe7d0f20cc030cf35c71b4393bed90e20aa8054bebbd60f8bb0f421ced7ce