Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe
Resource
win10v2004-20220901-en
General
-
Target
400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe
-
Size
126KB
-
MD5
08c57805f76b56ce5b0460cb7ca230e8
-
SHA1
672e08b079c40ffc8b102be43ee75f853e321200
-
SHA256
400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9
-
SHA512
58eaab26582f0a50a05f35961825158a330893d5a5ef363a73947591999f22cfc251ecb23c0cdacfb0cb50d8b9800c03f9118773aa316acdfda292fe356cc91c
-
SSDEEP
3072:mHtoJzgjQSTbdkGqtUW5MzjKtVs0DqcpYgdZzwIbMLRHJfyGzjcS:WtSWTRbLWeKtVsMqsAIbYP/zgS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1120 herjek.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 320 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\herjek = "C:\\Windows\\herjek.exe" 400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\herjek.config herjek.exe File opened for modification C:\Windows\herjek.config herjek.exe File created C:\Windows\herjek.exe 400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe File opened for modification C:\Windows\herjek.exe 400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1120 1276 400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe 27 PID 1276 wrote to memory of 1120 1276 400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe 27 PID 1276 wrote to memory of 1120 1276 400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe 27 PID 1276 wrote to memory of 1120 1276 400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe 27 PID 1120 wrote to memory of 320 1120 herjek.exe 28 PID 1120 wrote to memory of 320 1120 herjek.exe 28 PID 1120 wrote to memory of 320 1120 herjek.exe 28 PID 1120 wrote to memory of 320 1120 herjek.exe 28 PID 1120 wrote to memory of 1532 1120 herjek.exe 30 PID 1120 wrote to memory of 1532 1120 herjek.exe 30 PID 1120 wrote to memory of 1532 1120 herjek.exe 30 PID 1120 wrote to memory of 1532 1120 herjek.exe 30 PID 1120 wrote to memory of 1244 1120 herjek.exe 32 PID 1120 wrote to memory of 1244 1120 herjek.exe 32 PID 1120 wrote to memory of 1244 1120 herjek.exe 32 PID 1120 wrote to memory of 1244 1120 herjek.exe 32 PID 1532 wrote to memory of 472 1532 w32tm.exe 34 PID 1532 wrote to memory of 472 1532 w32tm.exe 34 PID 1532 wrote to memory of 472 1532 w32tm.exe 34 PID 1532 wrote to memory of 472 1532 w32tm.exe 34 PID 1244 wrote to memory of 668 1244 w32tm.exe 35 PID 1244 wrote to memory of 668 1244 w32tm.exe 35 PID 1244 wrote to memory of 668 1244 w32tm.exe 35 PID 1244 wrote to memory of 668 1244 w32tm.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe"C:\Users\Admin\AppData\Local\Temp\400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\herjek.exe"C:\Windows\herjek.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram "C:\Windows\herjek.exe" enable3⤵
- Modifies Windows Firewall
PID:320
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov3⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov4⤵PID:472
-
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /config /update3⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\w32tm.exew32tm /config /update4⤵PID:668
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD508c57805f76b56ce5b0460cb7ca230e8
SHA1672e08b079c40ffc8b102be43ee75f853e321200
SHA256400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9
SHA51258eaab26582f0a50a05f35961825158a330893d5a5ef363a73947591999f22cfc251ecb23c0cdacfb0cb50d8b9800c03f9118773aa316acdfda292fe356cc91c
-
Filesize
126KB
MD508c57805f76b56ce5b0460cb7ca230e8
SHA1672e08b079c40ffc8b102be43ee75f853e321200
SHA256400f52306aa7c3994c36188a7682f81c67c6044927c96669c4917bb7c8957cb9
SHA51258eaab26582f0a50a05f35961825158a330893d5a5ef363a73947591999f22cfc251ecb23c0cdacfb0cb50d8b9800c03f9118773aa316acdfda292fe356cc91c