Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
f9ce495e9aa0199d77c83d58945be93831c0584c2f950c27f6c2c5e8d8fec242.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9ce495e9aa0199d77c83d58945be93831c0584c2f950c27f6c2c5e8d8fec242.exe
Resource
win10v2004-20220901-en
General
-
Target
f9ce495e9aa0199d77c83d58945be93831c0584c2f950c27f6c2c5e8d8fec242.exe
-
Size
178KB
-
MD5
7b4dd70b0019b5d3215eb264ac449e20
-
SHA1
1dab2decd602a482b936beee6f2768460d8b7351
-
SHA256
f9ce495e9aa0199d77c83d58945be93831c0584c2f950c27f6c2c5e8d8fec242
-
SHA512
8b51b207c2d91a3d813dbca4a588122541025fd3a083739f71523ecb4c7ffb79cac72872a13e4e2d97e28ca8fa27de078b228e1f4ed8ef4090732f5be470d299
-
SSDEEP
3072:LchyinW3kt6ncDvnTHR6u1AIxjnw89JnszQcJdXI:pin4kpx6ujxF52dXI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 316 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe File created C:\PROGRA~3\Mozilla\sgfgrig.exe f9ce495e9aa0199d77c83d58945be93831c0584c2f950c27f6c2c5e8d8fec242.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1080 f9ce495e9aa0199d77c83d58945be93831c0584c2f950c27f6c2c5e8d8fec242.exe 316 sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 316 2028 taskeng.exe 29 PID 2028 wrote to memory of 316 2028 taskeng.exe 29 PID 2028 wrote to memory of 316 2028 taskeng.exe 29 PID 2028 wrote to memory of 316 2028 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9ce495e9aa0199d77c83d58945be93831c0584c2f950c27f6c2c5e8d8fec242.exe"C:\Users\Admin\AppData\Local\Temp\f9ce495e9aa0199d77c83d58945be93831c0584c2f950c27f6c2c5e8d8fec242.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1080
-
C:\Windows\system32\taskeng.exetaskeng.exe {99AB19B4-A4D1-4EDA-A6FB-F49C6A9B356D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD58a77a72bea9a7119eeb94c8eb932598b
SHA1eb5ecaa8d019079d1f99be04566f100e004d4d3e
SHA25689c798f98fb5e15de77ec49870b34b6b9f0a073a877896dfa9b211c1cf22595a
SHA512a5d854609ed6a08636ad6747444b135beb93cde8804e09cbffc79e187fcc3221ec6edfa0352faa57628d1ba0a45efbf1d1ab948f3e2cd2d83466047781359975
-
Filesize
178KB
MD58a77a72bea9a7119eeb94c8eb932598b
SHA1eb5ecaa8d019079d1f99be04566f100e004d4d3e
SHA25689c798f98fb5e15de77ec49870b34b6b9f0a073a877896dfa9b211c1cf22595a
SHA512a5d854609ed6a08636ad6747444b135beb93cde8804e09cbffc79e187fcc3221ec6edfa0352faa57628d1ba0a45efbf1d1ab948f3e2cd2d83466047781359975