Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
c3c49015b89201266d2513b4b3622dfa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3c49015b89201266d2513b4b3622dfa.exe
Resource
win10v2004-20240508-en
General
-
Target
c3c49015b89201266d2513b4b3622dfa.exe
-
Size
9.9MB
-
MD5
c3c49015b89201266d2513b4b3622dfa
-
SHA1
0bfeb9c05eb86d4e7c68eadf0779c340e7ed53d1
-
SHA256
5bb5aaa3120c863b9f4ac00f2e0ea9b10f70a182f8d276f1e84a25c978dc502e
-
SHA512
9b2c41b4a719baeab6961e0dc946092735db509ff2c216e3a0e486b6610ea59c50d50efb0bbe10773b7dfa86395ae4dce65bcabd2ea1893ea3dac5b3e542ba0e
-
SSDEEP
98304:3u5x6M1WopNhS9Yw8yPNhS9Yw8yuFhHZhANhS9Yw8yE:AiewflwfAh+wfE
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\windows\SysWOW64\drivers\spo0lve.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\windows\SysWOW64\drivers\spo0lve.exe c3c49015b89201266d2513b4b3622dfa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spron = "C:\\Users\\Admin\\AppData\\Local\\Temp/c3c49015b89201266d2513b4b3622dfa.exe" c3c49015b89201266d2513b4b3622dfa.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pigdesk.bmp" c3c49015b89201266d2513b4b3622dfa.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\joticon.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-1000-0000000FF1CE}\misc.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\wordicon.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\dotnet\dotnet.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\visicon.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Windows Photo Viewer\ImagingDevices.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\dbcicons.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\7-Zip\7z.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Windows Media Player\wmprph.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Common Files\microsoft shared\ink\mip.exe c3c49015b89201266d2513b4b3622dfa.exe File created C:\Program Files\Internet Explorer\ieinstal.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe c3c49015b89201266d2513b4b3622dfa.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe c3c49015b89201266d2513b4b3622dfa.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\WallpaperStyle = "2" c3c49015b89201266d2513b4b3622dfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\TileWallpaper = "2" c3c49015b89201266d2513b4b3622dfa.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 c3c49015b89201266d2513b4b3622dfa.exe 2584 c3c49015b89201266d2513b4b3622dfa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3c49015b89201266d2513b4b3622dfa.exe"C:\Users\Admin\AppData\Local\Temp\c3c49015b89201266d2513b4b3622dfa.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD5227b8941bb23c3fdae9669aebdefdb2d
SHA127df532b88c526a17bad98cd1cd60789422fadf8
SHA2568e9e38cefd07a214e9361090374ff4dad2dec94bc5d3e435b8c8b5e4c42a0cfc
SHA5129f46f4b285dcd7640e399e9123064b5e05dcc91fbd376d4a3c4cf41efd7427011475c68e0987e5566af48717e98aefcf07e030df340ecb0fa04095bb49fa1695