Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
254s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/09/2022, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
socksupd.exe
Resource
win7-20220901-en
General
-
Target
socksupd.exe
-
Size
197KB
-
MD5
57eb1430903457db36a36023304f8a38
-
SHA1
831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
-
SHA256
1962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
-
SHA512
a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
SSDEEP
3072:L6oyUN8LiJ4Ut3Fec85snm3HlR0zMgilHB9tEOzOGI8pJ/CB9XB/PkF4x:LXoLilt3FeKm1RgMrlHB92O+8pu
Malware Config
Extracted
systembc
109.107.187.226:4001
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 668 xeqx.exe 1148 xeqx.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\xeqx.job socksupd.exe File opened for modification C:\Windows\Tasks\xeqx.job socksupd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1900 socksupd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 944 wrote to memory of 668 944 taskeng.exe 28 PID 944 wrote to memory of 668 944 taskeng.exe 28 PID 944 wrote to memory of 668 944 taskeng.exe 28 PID 944 wrote to memory of 668 944 taskeng.exe 28 PID 944 wrote to memory of 1148 944 taskeng.exe 29 PID 944 wrote to memory of 1148 944 taskeng.exe 29 PID 944 wrote to memory of 1148 944 taskeng.exe 29 PID 944 wrote to memory of 1148 944 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\socksupd.exe"C:\Users\Admin\AppData\Local\Temp\socksupd.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
C:\Windows\system32\taskeng.exetaskeng.exe {6BA5B8A4-ED58-4357-BB17-308408FF3003} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\ProgramData\wefnw\xeqx.exeC:\ProgramData\wefnw\xeqx.exe start22⤵
- Executes dropped EXE
PID:668
-
-
C:\ProgramData\wefnw\xeqx.exeC:\ProgramData\wefnw\xeqx.exe start22⤵
- Executes dropped EXE
PID:1148
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
Filesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
Filesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e