Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
c3c49015b89201266d2513b4b3622dfa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3c49015b89201266d2513b4b3622dfa.exe
Resource
win10v2004-20240508-en
General
-
Target
c3c49015b89201266d2513b4b3622dfa.exe
-
Size
9.9MB
-
MD5
c3c49015b89201266d2513b4b3622dfa
-
SHA1
0bfeb9c05eb86d4e7c68eadf0779c340e7ed53d1
-
SHA256
5bb5aaa3120c863b9f4ac00f2e0ea9b10f70a182f8d276f1e84a25c978dc502e
-
SHA512
9b2c41b4a719baeab6961e0dc946092735db509ff2c216e3a0e486b6610ea59c50d50efb0bbe10773b7dfa86395ae4dce65bcabd2ea1893ea3dac5b3e542ba0e
-
SSDEEP
98304:3u5x6M1WopNhS9Yw8yPNhS9Yw8yuFhHZhANhS9Yw8yE:AiewflwfAh+wfE
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\windows\SysWOW64\drivers\spo0lve.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\windows\SysWOW64\drivers\spo0lve.exe c3c49015b89201266d2513b4b3622dfa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\spron = "C:\\Users\\Admin\\AppData\\Local\\Temp/c3c49015b89201266d2513b4b3622dfa.exe" c3c49015b89201266d2513b4b3622dfa.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Windows Media Player\wmpnscfg.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Windows Media Player\wmpenc.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Windows Defender\MpCmdRun.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Windows Defender\MSASCui.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Internet Explorer\ielowutil.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Windows Photo Viewer\ImagingDevices.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\7-Zip\7z.exe c3c49015b89201266d2513b4b3622dfa.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 c3c49015b89201266d2513b4b3622dfa.exe 2752 c3c49015b89201266d2513b4b3622dfa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3c49015b89201266d2513b4b3622dfa.exe"C:\Users\Admin\AppData\Local\Temp\c3c49015b89201266d2513b4b3622dfa.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD5227b8941bb23c3fdae9669aebdefdb2d
SHA127df532b88c526a17bad98cd1cd60789422fadf8
SHA2568e9e38cefd07a214e9361090374ff4dad2dec94bc5d3e435b8c8b5e4c42a0cfc
SHA5129f46f4b285dcd7640e399e9123064b5e05dcc91fbd376d4a3c4cf41efd7427011475c68e0987e5566af48717e98aefcf07e030df340ecb0fa04095bb49fa1695