Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
155fa636098441cfa5c112c091f939b80a7c62c1355e0053a61fec0ac29f3932.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
155fa636098441cfa5c112c091f939b80a7c62c1355e0053a61fec0ac29f3932.exe
Resource
win10v2004-20220901-en
General
-
Target
155fa636098441cfa5c112c091f939b80a7c62c1355e0053a61fec0ac29f3932.exe
-
Size
161KB
-
MD5
5b401eed7ea7f5cfc35c1c874d59c760
-
SHA1
9ad8977a3f607bf412dbc6e310ea307dc78794ed
-
SHA256
155fa636098441cfa5c112c091f939b80a7c62c1355e0053a61fec0ac29f3932
-
SHA512
5029246f11a0b8daf32631ea9329debf7986d2bd8161a6cb2f7b2f69ccbe3c03d2869cd50b57ac1f207a9329ce22066f2d5168ca1cc54a6bd751f2fa8f61dbc0
-
SSDEEP
3072:ZliwDUWyFcB9fu+JMl2uU82Ws7f9sjboPACTQembG4hY/i1vL:ZldD1Yc7GIBgbzjbfLhRV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 576 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 155fa636098441cfa5c112c091f939b80a7c62c1355e0053a61fec0ac29f3932.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1360 wrote to memory of 576 1360 taskeng.exe 28 PID 1360 wrote to memory of 576 1360 taskeng.exe 28 PID 1360 wrote to memory of 576 1360 taskeng.exe 28 PID 1360 wrote to memory of 576 1360 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\155fa636098441cfa5c112c091f939b80a7c62c1355e0053a61fec0ac29f3932.exe"C:\Users\Admin\AppData\Local\Temp\155fa636098441cfa5c112c091f939b80a7c62c1355e0053a61fec0ac29f3932.exe"1⤵
- Drops file in Program Files directory
PID:1484
-
C:\Windows\system32\taskeng.exetaskeng.exe {56019283-6A09-4C33-82F5-9620522016AA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD56e79a6d4aa0b0cf6783421f9e8d41876
SHA15cc2846f6bc4fca3768bf29f111b82af0f4917cf
SHA256a2a86decec3251718a0e90884511540712538577b86b64dd237a872df395694c
SHA512c5bbfdb091e9b5c74c4d73962bb6e1c79f7ccda21a38fad4da9f615ac282e30d1bf0f76a50bafe3c7169ffad5c4603adf663be1a94185afb85c70b570e6a6f54
-
Filesize
161KB
MD56e79a6d4aa0b0cf6783421f9e8d41876
SHA15cc2846f6bc4fca3768bf29f111b82af0f4917cf
SHA256a2a86decec3251718a0e90884511540712538577b86b64dd237a872df395694c
SHA512c5bbfdb091e9b5c74c4d73962bb6e1c79f7ccda21a38fad4da9f615ac282e30d1bf0f76a50bafe3c7169ffad5c4603adf663be1a94185afb85c70b570e6a6f54