Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
183s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe
Resource
win10v2004-20220812-en
General
-
Target
8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe
-
Size
34KB
-
MD5
6fed99d64bde908c165066c570ccb693
-
SHA1
6f9d025088456a85dfbf4bc893fb7310d45aaba5
-
SHA256
8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6
-
SHA512
8c367d69fd1b19a1ba2d52c6192766b74427be1bfb84c195296c1c54641c050a30aefe15e36907e87163e2a058df316c1581129a3c461284eb7295093a18af2f
-
SSDEEP
768:mzQYScGrIubHuYtvdxwYHw5FAe2Q0ncwxZ:gQTIubHy5wQ0N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 940 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 892 8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe 892 8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\d436e34a\jusched.exe 8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe File created C:\Program Files (x86)\d436e34a\d436e34a 8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe 940 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 892 wrote to memory of 940 892 8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe 28 PID 892 wrote to memory of 940 892 8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe 28 PID 892 wrote to memory of 940 892 8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe 28 PID 892 wrote to memory of 940 892 8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe"C:\Users\Admin\AppData\Local\Temp\8c6ca3d758576ecacd9d78369991a1742e50be47c1536abacb1d18d8c6083ad6.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\d436e34a\jusched.exe"C:\Program Files (x86)\d436e34a\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
34KB
MD5a039eeb8551b8b8b515d7ff00a5215fe
SHA11f10776654a01cda7f64d8c72c4f5be3860ae358
SHA256531703001dee32497c2e38abf03f1510293ebc26dfd531f2a019dff64bbc2001
SHA512c5b2079362f5544b265a57fe1ac41d201a4e1ffb7e0c78f1c8fd40a43d0326a254a529329c5be213a44816d53c53ae9afe0212467ea63ea361b0f9bdb77139a9
-
Filesize
34KB
MD5a039eeb8551b8b8b515d7ff00a5215fe
SHA11f10776654a01cda7f64d8c72c4f5be3860ae358
SHA256531703001dee32497c2e38abf03f1510293ebc26dfd531f2a019dff64bbc2001
SHA512c5b2079362f5544b265a57fe1ac41d201a4e1ffb7e0c78f1c8fd40a43d0326a254a529329c5be213a44816d53c53ae9afe0212467ea63ea361b0f9bdb77139a9
-
Filesize
34KB
MD5a039eeb8551b8b8b515d7ff00a5215fe
SHA11f10776654a01cda7f64d8c72c4f5be3860ae358
SHA256531703001dee32497c2e38abf03f1510293ebc26dfd531f2a019dff64bbc2001
SHA512c5b2079362f5544b265a57fe1ac41d201a4e1ffb7e0c78f1c8fd40a43d0326a254a529329c5be213a44816d53c53ae9afe0212467ea63ea361b0f9bdb77139a9