Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
2568898d4cd68b9e7854a1c043f8768692d77856497ed6ebb99f634379a1e8b1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2568898d4cd68b9e7854a1c043f8768692d77856497ed6ebb99f634379a1e8b1.exe
Resource
win10v2004-20220901-en
General
-
Target
2568898d4cd68b9e7854a1c043f8768692d77856497ed6ebb99f634379a1e8b1.exe
-
Size
299KB
-
MD5
329618972014745b99ad74bab7778070
-
SHA1
cc3f71e0b6cc513d86e0ec2c9087a7eea218785f
-
SHA256
2568898d4cd68b9e7854a1c043f8768692d77856497ed6ebb99f634379a1e8b1
-
SHA512
43dbffe80e7bbcb35d15750e838474edaf1a48b85a5bb3e028188e2e33c5b09900a83aa8fc9ea65c8c76b923e4b87d38f8facdd51bc35e2a961d4d9390325056
-
SSDEEP
6144:Pb41nDY6RZ+Pl9Mx0BeY6LCMXRdveOqvQ2w9Z5xntrGtccw:P8dZ6Mx0UYRMXDveDQ2+tcw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 296 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 2568898d4cd68b9e7854a1c043f8768692d77856497ed6ebb99f634379a1e8b1.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 296 1312 taskeng.exe 28 PID 1312 wrote to memory of 296 1312 taskeng.exe 28 PID 1312 wrote to memory of 296 1312 taskeng.exe 28 PID 1312 wrote to memory of 296 1312 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2568898d4cd68b9e7854a1c043f8768692d77856497ed6ebb99f634379a1e8b1.exe"C:\Users\Admin\AppData\Local\Temp\2568898d4cd68b9e7854a1c043f8768692d77856497ed6ebb99f634379a1e8b1.exe"1⤵
- Drops file in Program Files directory
PID:1468
-
C:\Windows\system32\taskeng.exetaskeng.exe {56019283-6A09-4C33-82F5-9620522016AA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD5833fcce0630c8ad7a06255b743d5933c
SHA1687b24dc6682b18deddd5e574c632a2033edc2fc
SHA256a0dc9c1e4d38d5d63f55cd182c158c3249a4efaafe8d01c156525fd47b36ed17
SHA512256c797c3dd8be93facc824c7fadaf9b49d53b50a3567af883d2b473f64a3109858f3d306172c3a19f364719c4471667b3f537b38e7df0ee9ee02621b5731ea6
-
Filesize
299KB
MD5833fcce0630c8ad7a06255b743d5933c
SHA1687b24dc6682b18deddd5e574c632a2033edc2fc
SHA256a0dc9c1e4d38d5d63f55cd182c158c3249a4efaafe8d01c156525fd47b36ed17
SHA512256c797c3dd8be93facc824c7fadaf9b49d53b50a3567af883d2b473f64a3109858f3d306172c3a19f364719c4471667b3f537b38e7df0ee9ee02621b5731ea6