Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 05:31

General

  • Target

    3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe

  • Size

    224KB

  • MD5

    a318643b9792e86da520cf0c5aedb380

  • SHA1

    0619b9b2362c643821443c5d538abeddda6fc032

  • SHA256

    3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83

  • SHA512

    79c184e36a72aa3daa875baa33c7a15886832a04c7478b3d7cf3f1d0488529f4a570b781a98fc4447544ed6f087d69c3d84a90f15c7ef7f193394b2a32f1de7b

  • SSDEEP

    6144:T44b7czK+MOjoF3/di++08qvFsRcfJgo5:84fijVjo1Fimlvybo5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe
    "C:\Users\Admin\AppData\Local\Temp\3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:1228
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {F3F73823-D8A6-4239-B7D7-78C7A9CC7FC5} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\PROGRA~3\Mozilla\jjruejn.exe
      C:\PROGRA~3\Mozilla\jjruejn.exe -npivonl
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\jjruejn.exe

    Filesize

    224KB

    MD5

    883254ba363740367062521dd3df088c

    SHA1

    969cd87c4481075d011938d946cc91a8faf607bd

    SHA256

    8873b37863683b57882448c3e2808b48baf672689e3c2cd1e7fc3ae228f007bf

    SHA512

    8a8ffb2a389668f0dad581144498220b1560d2cfa625a7449287a95b57e9ad0bd581080026afb66087ef922c53263572b04eac2916864005ceacce1032252fc2

  • C:\PROGRA~3\Mozilla\jjruejn.exe

    Filesize

    224KB

    MD5

    883254ba363740367062521dd3df088c

    SHA1

    969cd87c4481075d011938d946cc91a8faf607bd

    SHA256

    8873b37863683b57882448c3e2808b48baf672689e3c2cd1e7fc3ae228f007bf

    SHA512

    8a8ffb2a389668f0dad581144498220b1560d2cfa625a7449287a95b57e9ad0bd581080026afb66087ef922c53263572b04eac2916864005ceacce1032252fc2

  • memory/784-62-0x0000000000910000-0x000000000096B000-memory.dmp

    Filesize

    364KB

  • memory/784-63-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/784-64-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1228-54-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB

  • memory/1228-55-0x0000000000290000-0x00000000002EB000-memory.dmp

    Filesize

    364KB

  • memory/1228-56-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1228-57-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB