Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe
Resource
win10v2004-20220812-en
General
-
Target
5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe
-
Size
35KB
-
MD5
86b3f75e24062507cff7fcf59ebc860e
-
SHA1
c696747e2225fe4a559cc9ef97a545cbe9bd47c2
-
SHA256
5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730
-
SHA512
4f10b565bb6e638fc7d2208453e1cd3068ad7352720169ebaeeae16d1c1415682478c8d017c115227761521968d7424a080cee956ce59ec0f2347fdd9d2c4493
-
SSDEEP
768:mzQYScGrIubHuYtvdxwYHw5FAe2QPncwxwb:gQTIubHy5wQPw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1112 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1384 5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe 1384 5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\677a4f64\jusched.exe 5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe File created C:\Program Files (x86)\677a4f64\677a4f64 5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe 1112 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1112 1384 5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe 28 PID 1384 wrote to memory of 1112 1384 5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe 28 PID 1384 wrote to memory of 1112 1384 5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe 28 PID 1384 wrote to memory of 1112 1384 5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe"C:\Users\Admin\AppData\Local\Temp\5f45e9f78b3d5975cd3e3d9c7e4d53ee37f5fe8fe9d38ca18d3e4733cf9ae730.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\677a4f64\jusched.exe"C:\Program Files (x86)\677a4f64\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
35KB
MD5f8449a247518d38c1a6a24eaff81ef96
SHA17c77f8956d2aa5b497baa61ca116cd0deef2ae81
SHA256b319c4e7506ca31c2343d20b24002b73e973855e632356563eb7f8c8db757435
SHA512da694f5e88f4f375e6724916854fe28e081f17d4973a68f82ac73e0a4c048d3c71c43bb5b5941b84eb23c6a3a923d203f7e2daeca8bf00ae3b0fed8a392e2732
-
Filesize
35KB
MD5f8449a247518d38c1a6a24eaff81ef96
SHA17c77f8956d2aa5b497baa61ca116cd0deef2ae81
SHA256b319c4e7506ca31c2343d20b24002b73e973855e632356563eb7f8c8db757435
SHA512da694f5e88f4f375e6724916854fe28e081f17d4973a68f82ac73e0a4c048d3c71c43bb5b5941b84eb23c6a3a923d203f7e2daeca8bf00ae3b0fed8a392e2732
-
Filesize
35KB
MD5f8449a247518d38c1a6a24eaff81ef96
SHA17c77f8956d2aa5b497baa61ca116cd0deef2ae81
SHA256b319c4e7506ca31c2343d20b24002b73e973855e632356563eb7f8c8db757435
SHA512da694f5e88f4f375e6724916854fe28e081f17d4973a68f82ac73e0a4c048d3c71c43bb5b5941b84eb23c6a3a923d203f7e2daeca8bf00ae3b0fed8a392e2732