Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
b34a17ada321c9497bcf69b969b5c954be5f9f1502839aba617fb3eb47e838fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b34a17ada321c9497bcf69b969b5c954be5f9f1502839aba617fb3eb47e838fe.exe
Resource
win10v2004-20220812-en
General
-
Target
b34a17ada321c9497bcf69b969b5c954be5f9f1502839aba617fb3eb47e838fe.exe
-
Size
257KB
-
MD5
69293de34e877a52a08a4acffa44abf0
-
SHA1
06d69aa5191864d6d529d913349e92848023350f
-
SHA256
b34a17ada321c9497bcf69b969b5c954be5f9f1502839aba617fb3eb47e838fe
-
SHA512
b162da98b03c9804b13eafbf33a26599655f4e21d426a255eeb5b9e57de95edeb2a3a7b2311e5fa46417c00ee716841575a9a26b58a6d674169a71f5d83831f3
-
SSDEEP
6144:y0bR1+5kWFQBYAcJDpo6FPPt6g2BZ2B+Ylo63ZlDI7kcm:51i/ljo6d94Z2NC+H07Hm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1508 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe b34a17ada321c9497bcf69b969b5c954be5f9f1502839aba617fb3eb47e838fe.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1508 1280 taskeng.exe 29 PID 1280 wrote to memory of 1508 1280 taskeng.exe 29 PID 1280 wrote to memory of 1508 1280 taskeng.exe 29 PID 1280 wrote to memory of 1508 1280 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b34a17ada321c9497bcf69b969b5c954be5f9f1502839aba617fb3eb47e838fe.exe"C:\Users\Admin\AppData\Local\Temp\b34a17ada321c9497bcf69b969b5c954be5f9f1502839aba617fb3eb47e838fe.exe"1⤵
- Drops file in Program Files directory
PID:1932
-
C:\Windows\system32\taskeng.exetaskeng.exe {77BE630C-2AD9-447A-9B74-02874034697A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD58dede1c2c5551ea92bca3e7a58e74028
SHA122515dff4e789a3f80f3a72d8f8b3bab7bbd587f
SHA25636063f7328c9e430450d84617ec7f155e0c80d50431cef9c17bcb664c89e83fa
SHA5120d3e9dadf305d4cd035cbb18840ec8d414f631dcff4cabf8f6faa339cbfe7404cf0d1f8100e826659bf073275b1057bc64d1249bacbfb74da653a63ed441c886
-
Filesize
257KB
MD58dede1c2c5551ea92bca3e7a58e74028
SHA122515dff4e789a3f80f3a72d8f8b3bab7bbd587f
SHA25636063f7328c9e430450d84617ec7f155e0c80d50431cef9c17bcb664c89e83fa
SHA5120d3e9dadf305d4cd035cbb18840ec8d414f631dcff4cabf8f6faa339cbfe7404cf0d1f8100e826659bf073275b1057bc64d1249bacbfb74da653a63ed441c886