Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
a86408e9d451abf8bcbcaea95af9875ea0b23e54bfffc1e7dc0c1a840f1d0b28.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a86408e9d451abf8bcbcaea95af9875ea0b23e54bfffc1e7dc0c1a840f1d0b28.exe
Resource
win10v2004-20220812-en
General
-
Target
a86408e9d451abf8bcbcaea95af9875ea0b23e54bfffc1e7dc0c1a840f1d0b28.exe
-
Size
147KB
-
MD5
5b99e3ec441c4819be8b9a47e3e42610
-
SHA1
19921271906afccbcb6ffc8bce3da8389b053f57
-
SHA256
a86408e9d451abf8bcbcaea95af9875ea0b23e54bfffc1e7dc0c1a840f1d0b28
-
SHA512
0d4311f70de9e6cb5d3f34e9959592b08092e43dfe83a8237d399ef60b93ce7b1d933225a5b86345bc7e495923a02be7aadfbfe939ed2aaf481532e93a7e1e51
-
SSDEEP
3072:ylVH/Q9pLokvctwzeKanw/3qRkfs/SRyhQSJQsgXwksg7N/J:ylVfi9ctwzeKa+kFBiS6sg1z3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 768 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe a86408e9d451abf8bcbcaea95af9875ea0b23e54bfffc1e7dc0c1a840f1d0b28.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1160 wrote to memory of 768 1160 taskeng.exe 28 PID 1160 wrote to memory of 768 1160 taskeng.exe 28 PID 1160 wrote to memory of 768 1160 taskeng.exe 28 PID 1160 wrote to memory of 768 1160 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a86408e9d451abf8bcbcaea95af9875ea0b23e54bfffc1e7dc0c1a840f1d0b28.exe"C:\Users\Admin\AppData\Local\Temp\a86408e9d451abf8bcbcaea95af9875ea0b23e54bfffc1e7dc0c1a840f1d0b28.exe"1⤵
- Drops file in Program Files directory
PID:1324
-
C:\Windows\system32\taskeng.exetaskeng.exe {0D61F962-27AF-43C7-A3A4-F3D51B0028C7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD5ee1de6f2601012a4c97b06b9e4789c9b
SHA1b86529d63c9b43594f87ced17277a296a6a07481
SHA2561c7120009ce331ce1a888c659a159c058694a0b09b4eb6bbed4acc9aa8ebf098
SHA5125e22893f20ce752bb99d53517b63e0c7b773e788b54603636ed2de6884c0629f4c5acd0f63894057c76db49e9d8270b6f8a1dd68ad1178e45817aea277afd49d
-
Filesize
147KB
MD5ee1de6f2601012a4c97b06b9e4789c9b
SHA1b86529d63c9b43594f87ced17277a296a6a07481
SHA2561c7120009ce331ce1a888c659a159c058694a0b09b4eb6bbed4acc9aa8ebf098
SHA5125e22893f20ce752bb99d53517b63e0c7b773e788b54603636ed2de6884c0629f4c5acd0f63894057c76db49e9d8270b6f8a1dd68ad1178e45817aea277afd49d