Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
233a0b3629d257caeecf2fefb6597d8df5876967c292a706ddece460518537d5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
233a0b3629d257caeecf2fefb6597d8df5876967c292a706ddece460518537d5.exe
Resource
win10v2004-20220812-en
General
-
Target
233a0b3629d257caeecf2fefb6597d8df5876967c292a706ddece460518537d5.exe
-
Size
438KB
-
MD5
652177eff39ae98eefc28205b493d500
-
SHA1
1a628cee3e82f52e0958bb5780858c243d285244
-
SHA256
233a0b3629d257caeecf2fefb6597d8df5876967c292a706ddece460518537d5
-
SHA512
166e49efdb13620761f9be8c36154f17a2ef1e17f3195f8d0a695f6d7f1ddfeff57d30eece8ff304bf57f7ba0d1bb1cf5b978d78a8a5ca6648a5cdf0a337bc87
-
SSDEEP
12288:51i/ljo6d94Z2NC+H07HQP4pgIHy0/GqBcL4DGsxv3FA+:51i9Igs57HQPzIXGqy0K2tn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1660 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 233a0b3629d257caeecf2fefb6597d8df5876967c292a706ddece460518537d5.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1660 1772 taskeng.exe 28 PID 1772 wrote to memory of 1660 1772 taskeng.exe 28 PID 1772 wrote to memory of 1660 1772 taskeng.exe 28 PID 1772 wrote to memory of 1660 1772 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\233a0b3629d257caeecf2fefb6597d8df5876967c292a706ddece460518537d5.exe"C:\Users\Admin\AppData\Local\Temp\233a0b3629d257caeecf2fefb6597d8df5876967c292a706ddece460518537d5.exe"1⤵
- Drops file in Program Files directory
PID:1280
-
C:\Windows\system32\taskeng.exetaskeng.exe {3BB38AB4-5062-4CC7-9A68-7FCD5E8AB80D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438KB
MD5bec912ced711275e90792f81831d0285
SHA1af69f7767b24de5c3de98304021ca6f99e8446c3
SHA2562df7e25f92aa7be668e1711e0cf1724e22f7c4d7bb0689b8f31cd8d050be51d3
SHA512a240414b35586be51b8a0eab5b68faab6797ee2966e1e3c136b28e1589f6ddfe8e518de23bef192c722e0c3e0d48a9cc2833d0dac55b1e12db5a37a035061117
-
Filesize
438KB
MD5bec912ced711275e90792f81831d0285
SHA1af69f7767b24de5c3de98304021ca6f99e8446c3
SHA2562df7e25f92aa7be668e1711e0cf1724e22f7c4d7bb0689b8f31cd8d050be51d3
SHA512a240414b35586be51b8a0eab5b68faab6797ee2966e1e3c136b28e1589f6ddfe8e518de23bef192c722e0c3e0d48a9cc2833d0dac55b1e12db5a37a035061117