Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
IMG88957937579577593957937593756295Jimpy.exe
Resource
win7-20240708-en
General
-
Target
IMG88957937579577593957937593756295Jimpy.exe
-
Size
445KB
-
MD5
d3593f7e5a555a84fea5d70412463a0a
-
SHA1
1614572890ef26f28f3b7c9f04ba7e6eb06587d9
-
SHA256
53805ebc2b9eb59587ee7baeb45de6df203dbba25913de393026f4c14f0f5487
-
SHA512
4fbeab30dbe08a82480d21ee69b8ee0e92656c96f30eec84b0967373bb22f86310dc61421c02cd10689485eaea3ddad5173e77b7b0be3ff4a6752fb407c605f8
-
SSDEEP
6144:Cg1KQjoauKpc9yUm6WCWmr3lBQdbpBnHUqS6tJF4ZO7kLUaULIU+JB3zj9torp1s:YxMc9yUmHmrEdX0gtJFcopIFBjjc+
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1760 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3344 1760 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG88957937579577593957937593756295Jimpy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1760 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3852 wrote to memory of 1760 3852 IMG88957937579577593957937593756295Jimpy.exe 85 PID 3852 wrote to memory of 1760 3852 IMG88957937579577593957937593756295Jimpy.exe 85 PID 3852 wrote to memory of 1760 3852 IMG88957937579577593957937593756295Jimpy.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG88957937579577593957937593756295Jimpy.exe"C:\Users\Admin\AppData\Local\Temp\IMG88957937579577593957937593756295Jimpy.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Planta=Get-Content 'C:\Users\Admin\AppData\Local\Temp\Atomraketter\Antihysteric.Ing';$Donnick=$Planta.SubString(58063,3);.$Donnick($Planta)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 22443⤵
- Program crash
PID:3344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1760 -ip 17601⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD505feec34f8951c4a66d9c1fc1815c309
SHA125cbe83a1a0dc2527b0f14828325d78283420147
SHA256736c2ce0c3ec68af645c2e002900e1495685d43377cb8ef023d1d7d8b23fa0f4
SHA512ec01cbcd363cdc64d37a4d9dc84341fe10e8c8084213244bb1c261521a63c5a10951e4fc06a32b31440016c8c9d9124854e73baf0c24f7c21e20ede9c82238df
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82