Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
f213f3aa9006bf740ab8e759521bf0351ebf156ceed5a0aab8f6b99560572924.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f213f3aa9006bf740ab8e759521bf0351ebf156ceed5a0aab8f6b99560572924.exe
Resource
win10v2004-20220901-en
General
-
Target
f213f3aa9006bf740ab8e759521bf0351ebf156ceed5a0aab8f6b99560572924.exe
-
Size
283KB
-
MD5
a12472410ae2a0621f29428b7f6c5160
-
SHA1
e52ec1025e940d74bb82f6a81e4711892d958beb
-
SHA256
f213f3aa9006bf740ab8e759521bf0351ebf156ceed5a0aab8f6b99560572924
-
SHA512
9d5f14284ab0e7917dca0f4aabe7f6ea4adab6a2f2bb3e1fa369f261ee009dea0b6ecc264aed7061ac1542162ef5215728f713ca6111ddd5dd77a89a893b0279
-
SSDEEP
6144:E5+YVdttGOVfE3dhS0TF+3CTj1PCmjxypE4w330mhv9kKrepex0mC:EjnttTVfShSUF+Ejp1yi30y+KqA0mC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1936 jwufxge.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jwufxge.exe f213f3aa9006bf740ab8e759521bf0351ebf156ceed5a0aab8f6b99560572924.exe File created C:\PROGRA~3\Mozilla\hvkykah.dll jwufxge.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1936 1868 taskeng.exe 27 PID 1868 wrote to memory of 1936 1868 taskeng.exe 27 PID 1868 wrote to memory of 1936 1868 taskeng.exe 27 PID 1868 wrote to memory of 1936 1868 taskeng.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f213f3aa9006bf740ab8e759521bf0351ebf156ceed5a0aab8f6b99560572924.exe"C:\Users\Admin\AppData\Local\Temp\f213f3aa9006bf740ab8e759521bf0351ebf156ceed5a0aab8f6b99560572924.exe"1⤵
- Drops file in Program Files directory
PID:1184
-
C:\Windows\system32\taskeng.exetaskeng.exe {C7F0F604-95BE-472E-A407-F8BDFD8F269F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\PROGRA~3\Mozilla\jwufxge.exeC:\PROGRA~3\Mozilla\jwufxge.exe -kqepohf2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5e63df9a4aa9762a9138c699be5ab2b4e
SHA14855e1c4e9687c656b0bb8a8e33c0211320566cb
SHA25621a43572e85d72d83c774596e2a14fc777b49f430b6216731ba6bfdf14b4f5f4
SHA512669773050194f043c9b9f4ec00b3226fa49054f8fd2b9fdd53a038b602aae0cfe6a4b65204444c5feb2c14b51bc88633eabfa3a7c05f68605c0896da159217ff
-
Filesize
283KB
MD5e63df9a4aa9762a9138c699be5ab2b4e
SHA14855e1c4e9687c656b0bb8a8e33c0211320566cb
SHA25621a43572e85d72d83c774596e2a14fc777b49f430b6216731ba6bfdf14b4f5f4
SHA512669773050194f043c9b9f4ec00b3226fa49054f8fd2b9fdd53a038b602aae0cfe6a4b65204444c5feb2c14b51bc88633eabfa3a7c05f68605c0896da159217ff