Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe
Resource
win10v2004-20220901-en
General
-
Target
6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe
-
Size
124KB
-
MD5
0cb31cf501e1d0cfe6e0a26df5525850
-
SHA1
75d6092570e384c7a0578f0bde286362eea32844
-
SHA256
6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad
-
SHA512
d28934edd537f6ba4f562806f1a40eb90d754c2caa4974d772e8b4c79a728382133c3d5b13bdaf5f7401e4ad8b1f59faaf7589821d3b6e7b065a82bc1375c82a
-
SSDEEP
1536:vLBYbzcsgkNn4jnstTfIGsXbJyBnZuZ27ogIlt7TeNJOSA5mEY7X05uHaW34k5RZ:zLjnstTf9ZuZ2MgGwQ/2auHaFq4UvJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 644 jo3rgz87.exe 1124 jo3rgz87.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 2016 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\q92yb = "C:\\Users\\Admin\\AppData\\Roaming\\jo3rgz87.exe" 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2032 set thread context of 2016 2032 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 27 PID 644 set thread context of 1124 644 jo3rgz87.exe 29 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2016 2032 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 27 PID 2032 wrote to memory of 2016 2032 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 27 PID 2032 wrote to memory of 2016 2032 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 27 PID 2032 wrote to memory of 2016 2032 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 27 PID 2032 wrote to memory of 2016 2032 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 27 PID 2032 wrote to memory of 2016 2032 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 27 PID 2016 wrote to memory of 644 2016 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 28 PID 2016 wrote to memory of 644 2016 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 28 PID 2016 wrote to memory of 644 2016 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 28 PID 2016 wrote to memory of 644 2016 6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe 28 PID 644 wrote to memory of 1124 644 jo3rgz87.exe 29 PID 644 wrote to memory of 1124 644 jo3rgz87.exe 29 PID 644 wrote to memory of 1124 644 jo3rgz87.exe 29 PID 644 wrote to memory of 1124 644 jo3rgz87.exe 29 PID 644 wrote to memory of 1124 644 jo3rgz87.exe 29 PID 644 wrote to memory of 1124 644 jo3rgz87.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe"C:\Users\Admin\AppData\Local\Temp\6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exeC:\Users\Admin\AppData\Local\Temp\6c9d80521de98292ff5c53d7ae6ce0bb29d8814182a6c8adc8595b98e8833aad.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\jo3rgz87.exeC:\Users\Admin\AppData\Roaming\jo3rgz87.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Roaming\jo3rgz87.exeC:\Users\Admin\AppData\Roaming\jo3rgz87.exe4⤵
- Executes dropped EXE
PID:1124
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5968d7dadd377858705d174706557b2f5
SHA12930ed54a5f7b737eeb4edab1fc882c7f6ff2958
SHA256045fdda3ed3867d5c4d5dd893e583c657e5c944c0b37e84c3663d6745674a042
SHA512e58909ea9189c7729602d3df95bf49e7f76358775b6ae71aad07c36e78870f8826d19441b597767e4a17c59a798cfa36e9efa2b6585785a700c327da827a0e8b
-
Filesize
124KB
MD5968d7dadd377858705d174706557b2f5
SHA12930ed54a5f7b737eeb4edab1fc882c7f6ff2958
SHA256045fdda3ed3867d5c4d5dd893e583c657e5c944c0b37e84c3663d6745674a042
SHA512e58909ea9189c7729602d3df95bf49e7f76358775b6ae71aad07c36e78870f8826d19441b597767e4a17c59a798cfa36e9efa2b6585785a700c327da827a0e8b
-
Filesize
124KB
MD5968d7dadd377858705d174706557b2f5
SHA12930ed54a5f7b737eeb4edab1fc882c7f6ff2958
SHA256045fdda3ed3867d5c4d5dd893e583c657e5c944c0b37e84c3663d6745674a042
SHA512e58909ea9189c7729602d3df95bf49e7f76358775b6ae71aad07c36e78870f8826d19441b597767e4a17c59a798cfa36e9efa2b6585785a700c327da827a0e8b
-
Filesize
124KB
MD5968d7dadd377858705d174706557b2f5
SHA12930ed54a5f7b737eeb4edab1fc882c7f6ff2958
SHA256045fdda3ed3867d5c4d5dd893e583c657e5c944c0b37e84c3663d6745674a042
SHA512e58909ea9189c7729602d3df95bf49e7f76358775b6ae71aad07c36e78870f8826d19441b597767e4a17c59a798cfa36e9efa2b6585785a700c327da827a0e8b
-
Filesize
124KB
MD5968d7dadd377858705d174706557b2f5
SHA12930ed54a5f7b737eeb4edab1fc882c7f6ff2958
SHA256045fdda3ed3867d5c4d5dd893e583c657e5c944c0b37e84c3663d6745674a042
SHA512e58909ea9189c7729602d3df95bf49e7f76358775b6ae71aad07c36e78870f8826d19441b597767e4a17c59a798cfa36e9efa2b6585785a700c327da827a0e8b