Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
f786e9b27371ad8087a45fadfbe0bface98c07ccfc5fb4bd8188cbde439da766.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f786e9b27371ad8087a45fadfbe0bface98c07ccfc5fb4bd8188cbde439da766.exe
Resource
win10v2004-20220812-en
General
-
Target
f786e9b27371ad8087a45fadfbe0bface98c07ccfc5fb4bd8188cbde439da766.exe
-
Size
128KB
-
MD5
70e7fb1c2faa87b38a7ab84cb1286530
-
SHA1
ef5e19b5992e803f587a39ea15935ecc02461145
-
SHA256
f786e9b27371ad8087a45fadfbe0bface98c07ccfc5fb4bd8188cbde439da766
-
SHA512
5859cba868c136633721ca1f3126399f174379d986d1f35550146da507ed1e25d2e6541496e1f25017883e99e40b308ed200ff64db66c444a4123b03fc52e984
-
SSDEEP
3072:3IMVZT5GqVXivw0TaWC8hqsCK8k9t3ywG3RY1W9V7K:3IMVhEdo0Tap8hqsChk95yvhO+K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 332 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe f786e9b27371ad8087a45fadfbe0bface98c07ccfc5fb4bd8188cbde439da766.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 332 904 taskeng.exe 28 PID 904 wrote to memory of 332 904 taskeng.exe 28 PID 904 wrote to memory of 332 904 taskeng.exe 28 PID 904 wrote to memory of 332 904 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f786e9b27371ad8087a45fadfbe0bface98c07ccfc5fb4bd8188cbde439da766.exe"C:\Users\Admin\AppData\Local\Temp\f786e9b27371ad8087a45fadfbe0bface98c07ccfc5fb4bd8188cbde439da766.exe"1⤵
- Drops file in Program Files directory
PID:1184
-
C:\Windows\system32\taskeng.exetaskeng.exe {F3F73823-D8A6-4239-B7D7-78C7A9CC7FC5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:332
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5d903b8864cc4dcc4e2aa46614bcc61a6
SHA14421f0a335ea9f4b994202fb1c60c6cb1238cc46
SHA256966b8f0678edaac0326a31a02d9464b177409f7371e472398e3a59f36f7ee13f
SHA51234c9e83069c51a0ee2495c25e89945b918885237a159674d18cc351d7449fb41652805200a4cdfa9070bf86988d68f5a5e57084d856ad261d7c17963e23a555e
-
Filesize
128KB
MD5d903b8864cc4dcc4e2aa46614bcc61a6
SHA14421f0a335ea9f4b994202fb1c60c6cb1238cc46
SHA256966b8f0678edaac0326a31a02d9464b177409f7371e472398e3a59f36f7ee13f
SHA51234c9e83069c51a0ee2495c25e89945b918885237a159674d18cc351d7449fb41652805200a4cdfa9070bf86988d68f5a5e57084d856ad261d7c17963e23a555e