Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
79e9dd35aef6558461c4b93cd0c55b76_Purchase Order.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
79e9dd35aef6558461c4b93cd0c55b76_Purchase Order.jar
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
B2856B11FF23D35DA2C9C906C61781BA_purchaseorder.jar
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
B2856B11FF23D35DA2C9C906C61781BA_purchaseorder.jar
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
DB46ADCFAE462E7C475C171FBE66DF82_paymentadvice.jar
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
DB46ADCFAE462E7C475C171FBE66DF82_paymentadvice.jar
Resource
win10v2004-20240508-en
General
-
Target
B2856B11FF23D35DA2C9C906C61781BA_purchaseorder.jar
-
Size
47KB
-
MD5
b2856b11ff23d35da2c9c906c61781ba
-
SHA1
fcce5d47e80051f617291c7f0fe53e5f3249f56c
-
SHA256
75ff23be22ed5a003fde654d37d1b423e6353ea2e58adfcb8405a18dcbc951f6
-
SHA512
b486c3aaffa312d53194238213f2e460281eff4cddaff22f8830654398c9b3abd3ebf8cd6a3452bbd3201f3a1db2222f071c07dfc4d65fa357d989db45b7b554
-
SSDEEP
768:7nnfQxxfmEp1g/mSIdgVAhJw5UYIFqRTyNaFU1Gfo8XFJkFoesEVyY75+:83mEEeZdgtCYGJ0ouLkFoebo
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ProcessHacker.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ProcessHacker.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe\debugger = "svchost.exe" regedit.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2444 attrib.exe 2436 attrib.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\win32 = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Sys32\\Windows.jar.txt\"" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\win32 = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Sys32\\Windows.jar.txt\"" reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Sys32\Desktop.ini java.exe File opened for modification C:\Users\Admin\AppData\Roaming\Sys32\Desktop.ini attrib.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\tem javaw.exe File opened for modification C:\Windows\tem javaw.exe File created C:\Windows\tem java.exe File opened for modification C:\Windows\tem java.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2524 reg.exe 1364 reg.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1588 regedit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2272 java.exe 2456 javaw.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2524 2272 java.exe 29 PID 2272 wrote to memory of 2524 2272 java.exe 29 PID 2272 wrote to memory of 2524 2272 java.exe 29 PID 2272 wrote to memory of 2444 2272 java.exe 30 PID 2272 wrote to memory of 2444 2272 java.exe 30 PID 2272 wrote to memory of 2444 2272 java.exe 30 PID 2272 wrote to memory of 2436 2272 java.exe 31 PID 2272 wrote to memory of 2436 2272 java.exe 31 PID 2272 wrote to memory of 2436 2272 java.exe 31 PID 2272 wrote to memory of 2456 2272 java.exe 32 PID 2272 wrote to memory of 2456 2272 java.exe 32 PID 2272 wrote to memory of 2456 2272 java.exe 32 PID 2456 wrote to memory of 1364 2456 javaw.exe 33 PID 2456 wrote to memory of 1364 2456 javaw.exe 33 PID 2456 wrote to memory of 1364 2456 javaw.exe 33 PID 2456 wrote to memory of 112 2456 javaw.exe 35 PID 2456 wrote to memory of 112 2456 javaw.exe 35 PID 2456 wrote to memory of 112 2456 javaw.exe 35 PID 112 wrote to memory of 1588 112 cmd.exe 37 PID 112 wrote to memory of 1588 112 cmd.exe 37 PID 112 wrote to memory of 1588 112 cmd.exe 37 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2444 attrib.exe 2436 attrib.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\B2856B11FF23D35DA2C9C906C61781BA_purchaseorder.jar1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v win32 /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Sys32\Windows.jar.txt\"" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2524
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Sys32\*.*"2⤵
- Sets file to hidden
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2444
-
-
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\Sys32"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2436
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Sys32\Windows.jar.txt"2⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v win32 /t REG_SZ /d "\"C:\Program Files\Java\jre7\bin\javaw.exe\" -jar \"C:\Users\Admin\AppData\Roaming\Sys32\Windows.jar.txt\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1364
-
-
C:\Windows\system32\cmd.execmd.exe /c regedit /s C:\Users\Admin\AppData\Local\Temp\TaskNetworkGathor442590722461171175.reg3⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\TaskNetworkGathor442590722461171175.reg4⤵
- Sets file execution options in registry
- Runs .reg file with regedit
PID:1588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
719B
MD5311af3b9a52ffc58f46ad83afb1e93b6
SHA1031e8b46cce34a788841c709a2f12de599ec5970
SHA2562931fbf7795f4a215bff8b59fc53e035bc6c31a5294ce9bd5436343885599219
SHA5128e7d3ef1836b94bd9b9066bd264a7651b5f8ecaffaa757e0167b056ec0bbcc3059f3a9e1f563c4762ad5299ecc65b4766b6a3fcdcb4533cac90a2cc460a23150
-
Filesize
63B
MD5e783bdd20a976eaeaae1ff4624487420
SHA1c2a44fab9df00b3e11582546b16612333c2f9286
SHA2562f65fa9c7ed712f493782abf91467f869419a2f8b5adf23b44019c08190fa3f3
SHA5128c883678e4625ef44f4885b8c6d7485196774f9cb0b9eee7dd18711749bcae474163df9965effcd13ecd1a33cd7265010c152f8504d6013e4f4d85d68a901a80
-
Filesize
47KB
MD5b2856b11ff23d35da2c9c906c61781ba
SHA1fcce5d47e80051f617291c7f0fe53e5f3249f56c
SHA25675ff23be22ed5a003fde654d37d1b423e6353ea2e58adfcb8405a18dcbc951f6
SHA512b486c3aaffa312d53194238213f2e460281eff4cddaff22f8830654398c9b3abd3ebf8cd6a3452bbd3201f3a1db2222f071c07dfc4d65fa357d989db45b7b554