Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3Thunder Setup.exe
windows7-x64
8Thunder Setup.exe
windows10-2004-x64
8jre/Welcome.html
windows7-x64
1jre/Welcome.html
windows10-2004-x64
1jre/bin/JA...32.dll
windows7-x64
1jre/bin/JA...32.dll
windows10-2004-x64
1jre/bin/JA...ge.dll
windows7-x64
1jre/bin/JA...ge.dll
windows10-2004-x64
1jre/bin/Ja...32.dll
windows7-x64
1jre/bin/Ja...32.dll
windows10-2004-x64
1jre/bin/Ja...ge.dll
windows7-x64
1jre/bin/Ja...ge.dll
windows10-2004-x64
1jre/bin/Wi...32.dll
windows7-x64
3jre/bin/Wi...32.dll
windows10-2004-x64
3jre/bin/Wi...ge.dll
windows7-x64
3jre/bin/Wi...ge.dll
windows10-2004-x64
3jre/bin/awt.dll
windows7-x64
1jre/bin/awt.dll
windows10-2004-x64
1jre/bin/bci.dll
windows7-x64
3jre/bin/bci.dll
windows10-2004-x64
3jre/bin/cl...vm.dll
windows7-x64
3jre/bin/cl...vm.dll
windows10-2004-x64
3jre/bin/dcpr.dll
windows7-x64
1jre/bin/dcpr.dll
windows10-2004-x64
1jre/bin/de...se.dll
windows7-x64
3jre/bin/de...se.dll
windows10-2004-x64
3jre/bin/deploy.dll
windows7-x64
3jre/bin/deploy.dll
windows10-2004-x64
3jre/bin/dt_shmem.dll
windows7-x64
3jre/bin/dt_shmem.dll
windows10-2004-x64
3jre/bin/dt_socket.dll
windows7-x64
1jre/bin/dt_socket.dll
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
Thunder Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Thunder Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
jre/Welcome.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
jre/Welcome.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
jre/bin/JavaAccessBridge.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
jre/bin/JavaAccessBridge.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
jre/bin/awt.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
jre/bin/awt.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
jre/bin/bci.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
jre/bin/bci.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
jre/bin/client/jvm.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
jre/bin/client/jvm.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
jre/bin/dcpr.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
jre/bin/dcpr.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
jre/bin/decora_sse.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
jre/bin/decora_sse.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
jre/bin/deploy.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
jre/bin/deploy.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
jre/bin/dt_shmem.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
jre/bin/dt_shmem.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
jre/bin/dt_socket.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
jre/bin/dt_socket.dll
Resource
win10v2004-20240709-en
General
-
Target
Thunder Setup.exe
-
Size
78KB
-
MD5
1eb797341e423c83060a36b92c720cc9
-
SHA1
380828212f0bb9a82d568491247a590a316e4351
-
SHA256
0842a46a5113b1ff571e62101c556565c853a0c0c792f7fdde57eb40e0256177
-
SHA512
9115d3a22f0163747de035273cd44caa84c46e17cd3fee863172e35688455def25e07bdbf7bdcec940dfd8bd2da7eb10e360d7f5a9413efc8c4b61ad4605c19b
-
SSDEEP
1536:aZ2FWSNhd/4131izmvch6oKnLzx9QAkhHQ40Gp/VS6:A2ddQ131izLh6oqLzHHuHQ40Gp/VT
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell and hide display window.
pid Process 332 Powershell.exe 1340 Powershell.exe 1712 Powershell.exe 700 Powershell.exe 1340 Powershell.exe 1532 powershell.exe 1624 powershell.exe 1780 powershell.exe 1284 powershell.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1340 Powershell.exe 1712 Powershell.exe 700 Powershell.exe 332 Powershell.exe 700 Powershell.exe 700 Powershell.exe 1712 Powershell.exe 1712 Powershell.exe 332 Powershell.exe 332 Powershell.exe 1340 Powershell.exe 1340 Powershell.exe 1780 powershell.exe 1284 powershell.exe 1624 powershell.exe 1532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1340 Powershell.exe Token: SeDebugPrivilege 1712 Powershell.exe Token: SeDebugPrivilege 332 Powershell.exe Token: SeDebugPrivilege 700 Powershell.exe Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 1284 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 1532 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 javaw.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2692 1956 Thunder Setup.exe 30 PID 1956 wrote to memory of 2692 1956 Thunder Setup.exe 30 PID 1956 wrote to memory of 2692 1956 Thunder Setup.exe 30 PID 1956 wrote to memory of 2692 1956 Thunder Setup.exe 30 PID 1956 wrote to memory of 2692 1956 Thunder Setup.exe 30 PID 1956 wrote to memory of 2692 1956 Thunder Setup.exe 30 PID 1956 wrote to memory of 2692 1956 Thunder Setup.exe 30 PID 2692 wrote to memory of 1340 2692 javaw.exe 31 PID 2692 wrote to memory of 1340 2692 javaw.exe 31 PID 2692 wrote to memory of 1340 2692 javaw.exe 31 PID 2692 wrote to memory of 1340 2692 javaw.exe 31 PID 2692 wrote to memory of 1340 2692 javaw.exe 31 PID 2692 wrote to memory of 1340 2692 javaw.exe 31 PID 2692 wrote to memory of 1340 2692 javaw.exe 31 PID 2692 wrote to memory of 1712 2692 javaw.exe 32 PID 2692 wrote to memory of 1712 2692 javaw.exe 32 PID 2692 wrote to memory of 1712 2692 javaw.exe 32 PID 2692 wrote to memory of 1712 2692 javaw.exe 32 PID 2692 wrote to memory of 1712 2692 javaw.exe 32 PID 2692 wrote to memory of 1712 2692 javaw.exe 32 PID 2692 wrote to memory of 1712 2692 javaw.exe 32 PID 2692 wrote to memory of 700 2692 javaw.exe 34 PID 2692 wrote to memory of 700 2692 javaw.exe 34 PID 2692 wrote to memory of 700 2692 javaw.exe 34 PID 2692 wrote to memory of 700 2692 javaw.exe 34 PID 2692 wrote to memory of 700 2692 javaw.exe 34 PID 2692 wrote to memory of 700 2692 javaw.exe 34 PID 2692 wrote to memory of 700 2692 javaw.exe 34 PID 2692 wrote to memory of 332 2692 javaw.exe 35 PID 2692 wrote to memory of 332 2692 javaw.exe 35 PID 2692 wrote to memory of 332 2692 javaw.exe 35 PID 2692 wrote to memory of 332 2692 javaw.exe 35 PID 2692 wrote to memory of 332 2692 javaw.exe 35 PID 2692 wrote to memory of 332 2692 javaw.exe 35 PID 2692 wrote to memory of 332 2692 javaw.exe 35 PID 332 wrote to memory of 1624 332 Powershell.exe 39 PID 332 wrote to memory of 1624 332 Powershell.exe 39 PID 332 wrote to memory of 1624 332 Powershell.exe 39 PID 332 wrote to memory of 1624 332 Powershell.exe 39 PID 332 wrote to memory of 1624 332 Powershell.exe 39 PID 332 wrote to memory of 1624 332 Powershell.exe 39 PID 332 wrote to memory of 1624 332 Powershell.exe 39 PID 1340 wrote to memory of 1532 1340 Powershell.exe 41 PID 1340 wrote to memory of 1532 1340 Powershell.exe 41 PID 1340 wrote to memory of 1532 1340 Powershell.exe 41 PID 1340 wrote to memory of 1532 1340 Powershell.exe 41 PID 1340 wrote to memory of 1532 1340 Powershell.exe 41 PID 1340 wrote to memory of 1532 1340 Powershell.exe 41 PID 1340 wrote to memory of 1532 1340 Powershell.exe 41 PID 700 wrote to memory of 1780 700 Powershell.exe 42 PID 700 wrote to memory of 1780 700 Powershell.exe 42 PID 700 wrote to memory of 1780 700 Powershell.exe 42 PID 700 wrote to memory of 1780 700 Powershell.exe 42 PID 700 wrote to memory of 1780 700 Powershell.exe 42 PID 700 wrote to memory of 1780 700 Powershell.exe 42 PID 700 wrote to memory of 1780 700 Powershell.exe 42 PID 1712 wrote to memory of 1284 1712 Powershell.exe 40 PID 1712 wrote to memory of 1284 1712 Powershell.exe 40 PID 1712 wrote to memory of 1284 1712 Powershell.exe 40 PID 1712 wrote to memory of 1284 1712 Powershell.exe 40 PID 1712 wrote to memory of 1284 1712 Powershell.exe 40 PID 1712 wrote to memory of 1284 1712 Powershell.exe 40 PID 1712 wrote to memory of 1284 1712 Powershell.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\Thunder Setup.exe"C:\Users\Admin\AppData\Local\Temp\Thunder Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe"C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\activation.jar;lib\antlr4-runtime.jar;lib\asm-all.jar;lib\commons-email.jar;lib\connector-api.jar;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\dyn4j.jar;lib\gson.jar;lib\HikariCP-java6.jar;lib\javassist-GA.jar;lib\jaybird-jdk18.jar;lib\jfoenix.jar;lib\jkeymaster.jar;lib\jna.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-desktop-hotkey-ext.jar;lib\jphp-game-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-gui-jfoenix-ext.jar;lib\jphp-json-ext.jar;lib\jphp-jsoup-ext.jar;lib\jphp-mail-ext.jar;lib\jphp-runtime.jar;lib\jphp-sql-ext.jar;lib\jphp-systemtray-ext.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\jsoup.jar;lib\mail.jar;lib\mysql-connector-java.jar;lib\postgresql.jre7.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\sqlite-jdbc.jar;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command Add-MpPreference -Force -ExclusionPath C:\' -Verb RunAs}"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -Force -ExclusionPath C:\4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command Set-MpPreference -Force -DisableBehaviorMonitoring ' -Verb RunAs}"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableBehaviorMonitoring4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command Set-MpPreference -Force -DisableIOAVProtection ' -Verb RunAs}"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableIOAVProtection4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command Set-MpPreference -Force -DisableRealtimeMonitoring ' -Verb RunAs}"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableRealtimeMonitoring4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5abe27ad8054b8669e06efdae1d666603
SHA1b7bbb8e0f13e49b3f073b5505eef1cbd9a0d667f
SHA2568b3ee5bee9b19cbfda45c7b1c94cf86f70dca7a73251cd1bf610cd3e4379f260
SHA5124c5e538673650cf23090836d91b81dbfba35ac8a2f59c33043a290f8269aeda20597b76febbc00db8af38f872cb2f4e3e86c3abd476abcf33d7aba506dcc9c6a