Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 20:30 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2ef4c765a721df9af1d3c90c4fe2926d9d5beddd1251fe2babcae9782240e138.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ef4c765a721df9af1d3c90c4fe2926d9d5beddd1251fe2babcae9782240e138.exe
Resource
win10v2004-20220812-en
General
-
Target
2ef4c765a721df9af1d3c90c4fe2926d9d5beddd1251fe2babcae9782240e138.exe
-
Size
290KB
-
MD5
a0616e5804753d803a522e3cdc01c360
-
SHA1
84d960c092a116f5cde45d7288338b7c65115533
-
SHA256
2ef4c765a721df9af1d3c90c4fe2926d9d5beddd1251fe2babcae9782240e138
-
SHA512
c75716969ac5be6c1f5d877b036e5823339812975aee07296321fbf681958db1ba4702c3acd80aea8fd928fb9184a1f11c19da329a49ec2f5b50d275a8eb02e8
-
SSDEEP
6144:vX5jF73fCuHYpjlrBnJAD2XEN6er3qgmbrU75MLlf4YKLHwD/:vNF73fF4vrXAD5avoukLU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1452 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 2ef4c765a721df9af1d3c90c4fe2926d9d5beddd1251fe2babcae9782240e138.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1272 wrote to memory of 1452 1272 taskeng.exe 28 PID 1272 wrote to memory of 1452 1272 taskeng.exe 28 PID 1272 wrote to memory of 1452 1272 taskeng.exe 28 PID 1272 wrote to memory of 1452 1272 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ef4c765a721df9af1d3c90c4fe2926d9d5beddd1251fe2babcae9782240e138.exe"C:\Users\Admin\AppData\Local\Temp\2ef4c765a721df9af1d3c90c4fe2926d9d5beddd1251fe2babcae9782240e138.exe"1⤵
- Drops file in Program Files directory
PID:1632
-
C:\Windows\system32\taskeng.exetaskeng.exe {E8514208-E8DE-4A86-86A3-94A7A84EF02B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
290KB
MD5dbd46108dbf9704e42fc25bd9914c0ca
SHA1ae2e44a20ff8b4ce0c602e925e57a0ce327bc731
SHA2564a07e5a3db4e5b81c4b9ec1f2701653ad1e2bb09160fd346d1e1d4a5038506c3
SHA512ae387ddd632ec6a97e0aa33d44a5279b0e9888cb0a3de1e9c7a5ec33f2f8eddee27ac67a84342ae278d6e4b88cd55f8aae8a5d88102df03ac312609238017964
-
Filesize
290KB
MD5dbd46108dbf9704e42fc25bd9914c0ca
SHA1ae2e44a20ff8b4ce0c602e925e57a0ce327bc731
SHA2564a07e5a3db4e5b81c4b9ec1f2701653ad1e2bb09160fd346d1e1d4a5038506c3
SHA512ae387ddd632ec6a97e0aa33d44a5279b0e9888cb0a3de1e9c7a5ec33f2f8eddee27ac67a84342ae278d6e4b88cd55f8aae8a5d88102df03ac312609238017964