Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
56366ae1f6e1f11e380f4aa7c6d17e876a220e2e8630073385f7f0d7056d8f6a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56366ae1f6e1f11e380f4aa7c6d17e876a220e2e8630073385f7f0d7056d8f6a.exe
Resource
win10v2004-20220812-en
General
-
Target
56366ae1f6e1f11e380f4aa7c6d17e876a220e2e8630073385f7f0d7056d8f6a.exe
-
Size
139KB
-
MD5
0c07981a673ed47799a2faeec44722f0
-
SHA1
a94f8a3a3553dfce0c9aef4171471497ba2ca067
-
SHA256
56366ae1f6e1f11e380f4aa7c6d17e876a220e2e8630073385f7f0d7056d8f6a
-
SHA512
af44660e51d1b2c8c11c62d9ba1b238fb9ea54c381aa209143227949b6789f13c191888c54c143dc199b8455c8fb8f5fcd666e15fea8521d18e7ff2acfed8f27
-
SSDEEP
3072:Ag80rFQjzNbHUrRVJ/F0MKmPNdpBTeG+ueunR8JjKGBhcy:r80SYpqMKmPNdnXWeM5fcy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1272 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 56366ae1f6e1f11e380f4aa7c6d17e876a220e2e8630073385f7f0d7056d8f6a.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 952 wrote to memory of 1272 952 taskeng.exe 29 PID 952 wrote to memory of 1272 952 taskeng.exe 29 PID 952 wrote to memory of 1272 952 taskeng.exe 29 PID 952 wrote to memory of 1272 952 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\56366ae1f6e1f11e380f4aa7c6d17e876a220e2e8630073385f7f0d7056d8f6a.exe"C:\Users\Admin\AppData\Local\Temp\56366ae1f6e1f11e380f4aa7c6d17e876a220e2e8630073385f7f0d7056d8f6a.exe"1⤵
- Drops file in Program Files directory
PID:1052
-
C:\Windows\system32\taskeng.exetaskeng.exe {09DDB1F4-0980-403A-B34B-67C76804AC3A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD552c51d1df43a7f30cda08a77f0e9ee09
SHA17245ee0ad593f6a73d3c29c77ae82493b34e18d1
SHA256e569d1ad7dfb98efac11d2a42c8adb4ac06694c58531f2f9c290b4c604eecf80
SHA512c73f4da10e652c0e2e614a3f84b5ce5a74672b7f9551576277bcd67905fd02dcb92c06719041db898e48da1bd258678f98d8a25ef7056481655591c77b76f8db
-
Filesize
32KB
MD51fb0d90a6cf4c531d55aa8da210a1f01
SHA154c14b1dc81ff36a6279866ef0e6ce7a0179756f
SHA256d5bf1394477f9ffe5471a062b2075eb199fa6159aa06eb2d6fc12240008fa60c
SHA512a86ff8443cdfd29e8786418ed7c820ca0dd635e9c94836944ef478e9010b065ab7d9f1e76a20be4764c7fd215057a9789c0dd3a56c327d91c5f3b149cec6c621