Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
8cb12865a71d87d7311228712db74940N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8cb12865a71d87d7311228712db74940N.exe
Resource
win10v2004-20240802-en
General
-
Target
8cb12865a71d87d7311228712db74940N.exe
-
Size
2.3MB
-
MD5
8cb12865a71d87d7311228712db74940
-
SHA1
5015be61802f5b83ca32d637f30df892d8aca0e2
-
SHA256
376b0d8fb80858c81d3e0536b9dc4e7be10948118f1aefe449a1f3d32eadbc9d
-
SHA512
0ce4b7ec46da883a6485195f7d3b872a9bd3fef8593b595069868f05720c593a17060dd92ffbc7b7c0b91e362a9abd2365a280eed02090ee1e0e4053f4861e68
-
SSDEEP
49152:ub+yLLwRrB3tRPltBW5LqLM4DtipK6FvMK7m/1OavYc+F:jwLu13B68g+tiptm9Uc+F
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" 8cb12865a71d87d7311228712db74940N.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\mip.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java-rmi.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\javac.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\OSE.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\initial_prefere.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\initial_prefere.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ieinstal.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\java-rmi.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\sIRC4.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\TabTip.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jar.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\chrmstp.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ExtExport.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX901A.tmp 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javadoc.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrmstp.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\setup.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\notification_helper.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\InputPersonalization.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\elevation_service.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX903B.tmp 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\appletviewer.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\dotnet.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\createdump.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\java.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\javadoc.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\createdump.exe 8cb12865a71d87d7311228712db74940N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\notification_helper.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\ExtExport.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\mip.exe 8cb12865a71d87d7311228712db74940N.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 8cb12865a71d87d7311228712db74940N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cb12865a71d87d7311228712db74940N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b126345317624479f78fbf30b3a1fe5a
SHA1655c966bf7bbf96ee49c83062d30b9dba17d693c
SHA2568723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301
SHA512d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d
-
Filesize
2.3MB
MD58cb12865a71d87d7311228712db74940
SHA15015be61802f5b83ca32d637f30df892d8aca0e2
SHA256376b0d8fb80858c81d3e0536b9dc4e7be10948118f1aefe449a1f3d32eadbc9d
SHA5120ce4b7ec46da883a6485195f7d3b872a9bd3fef8593b595069868f05720c593a17060dd92ffbc7b7c0b91e362a9abd2365a280eed02090ee1e0e4053f4861e68