Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
entry001/FILE0039.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
entry001/FILE0039.exe
Resource
win10v2004-20240709-en
General
-
Target
entry001/FILE0039.exe
-
Size
1.5MB
-
MD5
15aee466f47357a6f92385c57e050730
-
SHA1
e42caaab64dda15a44c854c1733614c2a58fa371
-
SHA256
ac0528667e7cf1e1bd877e66e1dc0451c3e830229baa5120bce7f7ce6e5bd921
-
SHA512
1cf3936e3de41029335380606ca2fb1cf03f63fff09e6feead7cc2c2f142887d9fd66d728e62df4781bf723351ca00b7e060a003a386ccb307333d03b30f10a4
-
SSDEEP
6144:6afsiuvAQ+tTm6cyERSiytj71cWE4jKS6vwnhB9Y5EwAQVAyhV:XCvAQ+q6ctRt636WfjO4hB9Y5EwAQV/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2912 msn.exe -
Loads dropped DLL 2 IoCs
pid Process 3052 FILE0039.exe 3052 FILE0039.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\apo5 = "C:\\Program Files (x86)\\win\\msn.exe" FILE0039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" FILE0039.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\p: msn.exe File opened (read-only) \??\q: msn.exe File opened (read-only) \??\i: msn.exe File opened (read-only) \??\m: msn.exe File opened (read-only) \??\o: msn.exe File opened (read-only) \??\n: msn.exe File opened (read-only) \??\t: msn.exe File opened (read-only) \??\u: msn.exe File opened (read-only) \??\b: msn.exe File opened (read-only) \??\g: msn.exe File opened (read-only) \??\j: msn.exe File opened (read-only) \??\v: msn.exe File opened (read-only) \??\x: msn.exe File opened (read-only) \??\y: msn.exe File opened (read-only) \??\z: msn.exe File opened (read-only) \??\h: msn.exe File opened (read-only) \??\l: msn.exe File opened (read-only) \??\s: msn.exe File opened (read-only) \??\r: msn.exe File opened (read-only) \??\w: msn.exe File opened (read-only) \??\a: msn.exe File opened (read-only) \??\e: msn.exe File opened (read-only) \??\k: msn.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe FILE0039.exe File opened for modification C:\Windows\SysWOW64\runouce.exe FILE0039.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\readme.eml FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\readme.eml FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\epl-v10.html FILE0039.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\readme.eml FILE0039.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe FILE0039.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe FILE0039.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe FILE0039.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{8EA3FE23-8E0B-4836-8777-C2D6ED0590DC}\chrome_installer.exe FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewFrame.html FILE0039.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\readme.eml FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE FILE0039.exe File opened for modification C:\Program Files (x86)\win\msn.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsBlankPage.html FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsFormTemplate.html FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe FILE0039.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\readme.eml FILE0039.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\mosaic_window.html FILE0039.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe FILE0039.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe FILE0039.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsPreviewTemplate.html FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\readme.eml FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe FILE0039.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe FILE0039.exe File created C:\Program Files (x86)\win\msn.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe FILE0039.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\readme.eml FILE0039.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsImageTemplate.html FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\readme.eml FILE0039.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\readme.eml FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE FILE0039.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html FILE0039.exe File created C:\Program Files (x86)\Microsoft Office\Office14\AccessWeb\readme.eml FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsBlankPage.html FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE FILE0039.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\license.html FILE0039.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\readme.eml FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe FILE0039.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\readme.eml FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsBlankPage.html FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\readme.eml FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\DADSHIRT.HTM FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe FILE0039.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\license.html FILE0039.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe FILE0039.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\ReadMe.htm FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsBrowserUpgrade.html FILE0039.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE FILE0039.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe FILE0039.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms\Storage2 msn.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1076 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1076 AUDIODG.EXE Token: 33 1076 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1076 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3052 3004 FILE0039.exe 29 PID 3004 wrote to memory of 3052 3004 FILE0039.exe 29 PID 3004 wrote to memory of 3052 3004 FILE0039.exe 29 PID 3004 wrote to memory of 3052 3004 FILE0039.exe 29 PID 3052 wrote to memory of 2912 3052 FILE0039.exe 30 PID 3052 wrote to memory of 2912 3052 FILE0039.exe 30 PID 3052 wrote to memory of 2912 3052 FILE0039.exe 30 PID 3052 wrote to memory of 2912 3052 FILE0039.exe 30 PID 3004 wrote to memory of 1208 3004 FILE0039.exe 20 PID 3004 wrote to memory of 1208 3004 FILE0039.exe 20 PID 2328 wrote to memory of 2896 2328 rundll32.exe 39 PID 2328 wrote to memory of 2896 2328 rundll32.exe 39 PID 2328 wrote to memory of 2896 2328 rundll32.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\entry001\FILE0039.exe"C:\Users\Admin\AppData\Local\Temp\entry001\FILE0039.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\entry001\FILE0039.exe"C:\Users\Admin\AppData\Local\Temp\entry001\FILE0039.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\win\msn.exe"C:\Program Files (x86)\win\msn.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies Internet Explorer settings
PID:2912
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\entry001\FILE0039.exe"C:\Users\Admin\AppData\Local\Temp\entry001\FILE0039.exe"2⤵PID:1568
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\entry001\FILE00392⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\entry001\FILE00393⤵PID:2896
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5d4175ecf76a11096cb294fa6646d2cf4
SHA15f70f8b12995dd8150fc0028d340ebfc4aaf3b36
SHA256013e0ca66ede319ddbc81643517b44321f59936241d6c0b24f9032c3638457d7
SHA51220d32e604e453bf0db4d0b7b83f65b44e05b354eb4dbeeaf651c12d5be2defcfe8a6ae74f8f474465a223c39bd739660b43eaeb5478ee5b6c5216d3bccc803a5
-
Filesize
347KB
MD5488d80821d4afd1d16aef6391f8f0837
SHA1e4398378c0b260de239f9bc31fd95baa165fcf10
SHA25667a8a006e3a70970bc19426ac0cdb8ce14c02f3c7fec27b6d7c84cb8e5e5da63
SHA51244dec0abd3313728c51fc3c0ff04d0caadda9785df60d836e2d398c0c6409f5b7cbc5f45795127a2c24a154345ad63347a19893df151b5c25e891c75e69d8833
-
Filesize
1.4MB
MD5bff673bca03571321b3855e421394143
SHA15fb908baf835743470c98c90cf0c3cd2a1acf257
SHA256a1572e7328b998037503ad8866fadef99221acd47f5a6d0c7a85764af641c5b6
SHA512f6b68b03b64122be5ba11b330b505904612db5833aacf1a75baf9d66b6fc2c836e8c62c45323995423d0f789170d196f471fa2d5525e527d2f5e49490bc9c98b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\readme.eml
Filesize14KB
MD50f0402e147098b8b4a4336219a563011
SHA1f083df029f2620180d8514b25b17287efaafac16
SHA2561c522e0ffe172ee5077bfb5691f8c41527b5c62231218929af9d86723b959104
SHA512be68a4f9fe2822aeecdaf571e90903f4a6c83c78a2cd51cee1491abb23af764e4d7bbbd9d73a1647f46a94a5c686108ff8de54f3ecd741bf2a7420f39851829a
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize12KB
MD58156706568e77846b7bfbcc091c6ffeb
SHA1792aa0db64f517520ee8f745bee71152532fe4d2
SHA2565e19cfbd6690649d3349e585472385186d99f56a94dc32d9073b83011cea85f8
SHA5128760f26069296f0fe09532f1244d93a57db4cafa8d06aaa9dc981bcaed4bde05366ef21e6f0c1aadad4478382b59a4e43d26c04185cf2ed965901321d05604b8
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize8KB
MD57757fe48a0974cb625e89012c92cc995
SHA1e4684021f14053c3f9526070dc687ff125251162
SHA256c0a8aa811a50c9b592c8f7987c016e178c732d7ebfd11aa985a8f0480539fa03
SHA512b3d4838b59f525078542e7ebbf77300d6f94e13b0bff1c9a2c5b44a66b89310a2593815703f9571565c18b0cdeb84e9e48432208aaa25dff9d2223722902d526
-
Filesize
661KB
MD5c421fb3139988f6fb07d81803f0fcc7e
SHA13da5d6246200b64d368ad05d6ca51594eb402b4d
SHA2569f3daa020a2b65858fbb179d9a75bcd7a33400ccbaa54f0caf620a39d0da6818
SHA51273e0a02546a46f1b8aaf170972551c5b4d8d57032a382fc40dd58461999c57629dc9ce487590bcff7576604d07b093f3a6c88cc13bb632729f3eb1392d7e2dfd
-
Filesize
972KB
MD55a5d9199fbf70ce018f43c22d657f1b1
SHA1ca0ced5af3bbff0aa268b215c29599e7d243c4a2
SHA256f664fc8be71f93db3a8394479d270701fdd45a821800a4c50711c7638fc1a339
SHA51271d342a5a47e388e185b2bc856b73cd87cd275b2d32004317e622e98778decf44cc1709005fef387e70585ce3bed271c03d5b283a2b38188e51f5f39c0c1fc14
-
Filesize
451KB
MD5a0fa9bf5ad6ee0885199e35a68b3663b
SHA1aca0aae0c163a5da8382f3c0ea22c4fb6ea3532b
SHA256bcd39d32e479ab9fb166095cfed1dfc6f5952d987266d639dd3e00707f87dd4c
SHA512e23d4daf03f5ff078e1a7c80c77cdb7112050fd5ce7629edc5e4216a329e7e963c2948c5b9c29d3a1cac61bc89d3c0be7fa188a8fea29c8ed78a9568f6eb37af
-
Filesize
640KB
MD5b11d8fa18e6944eee313e36b1db12945
SHA1341ded39f1878f20260972a3fc1156a84422b53f
SHA2561a94d22f1348173f40bbd1a0400428af9c848c3a960449fde7d6a361791974de
SHA512b8af640285be1c9688e1ff8e38bac82960532bacf35ee5535e84d0798fc8138b2f56d92654d6ef9e5ec9cd045391856fcd3504688272054855c11cc02c204c43
-
Filesize
640KB
MD58650e446e7adf22fe1bd224a691bde4d
SHA1049d53a11bd777df4e77e2c40102559a4e93ba1b
SHA256e4102f09908ad97c6cad854c95ec030ec02a8af48a85f02c92c863cd1cbd7058
SHA512ced19e775c216b62e8e3c7e745a06dbb5e56c2297f809aeb8b1229975303169aa86b2c26f71d8b0302d7a594928b8ff55477d9a05fa36e0b4dc55ed4b808cfdc
-
Filesize
461KB
MD591f28cc6470fd30cc6b504d874c615b9
SHA1d545e2003a02737b569a3c2443e09e51a191ecf7
SHA2569ae7845df1381b158c6583d4b1a7cb3f0c38a28ba3f710038dc3497d7fe95638
SHA512dee4687326b305fe24d67a39edce97ae01f6626f5b32d7ecdd3c8672ec0273c4f44bae7fadac315d0fffcc2b981d70970e145da3d9c4cbe7ec7765750279e60f
-
Filesize
152KB
MD5e3042ed68920a4791052ef5bfc9e1179
SHA1b902c501d34e79e6f037b6a2eb261bacd9c28c34
SHA256f0226fbd52267c844d582b60b966d15184fe1e3ce38805ce4c6d4e30ed47c639
SHA512330a4ad4a6394b162ac87276924483addebb339842315bda9d433500d1016556ceff7ad0013ebc3c901c5e3ad1ebe5a13dd78a3a42792963392fbaf73d30c1fa
-
Filesize
10KB
MD5509e21500da07d9c1e832e533189dd2d
SHA15faf5344512a99fa5f3c514c4f35092915994e2a
SHA256fe2b959c370901d65eefb92e62e5af7d91e04cdafc5f3e18667256b0e316f013
SHA51250dcd2df8678802ad182444cbf0674a58ebe4c8ff7796adc2e49c531cdd05c5940a3fffda6aecd77bab6c61125a3c0b8efdacc629f1fe9985166b137bd3332ad
-
Filesize
1.5MB
MD515aee466f47357a6f92385c57e050730
SHA1e42caaab64dda15a44c854c1733614c2a58fa371
SHA256ac0528667e7cf1e1bd877e66e1dc0451c3e830229baa5120bce7f7ce6e5bd921
SHA5121cf3936e3de41029335380606ca2fb1cf03f63fff09e6feead7cc2c2f142887d9fd66d728e62df4781bf723351ca00b7e060a003a386ccb307333d03b30f10a4