Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe
Resource
win10v2004-20220812-en
General
-
Target
3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe
-
Size
224KB
-
MD5
a318643b9792e86da520cf0c5aedb380
-
SHA1
0619b9b2362c643821443c5d538abeddda6fc032
-
SHA256
3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83
-
SHA512
79c184e36a72aa3daa875baa33c7a15886832a04c7478b3d7cf3f1d0488529f4a570b781a98fc4447544ed6f087d69c3d84a90f15c7ef7f193394b2a32f1de7b
-
SSDEEP
6144:T44b7czK+MOjoF3/di++08qvFsRcfJgo5:84fijVjo1Fimlvybo5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 784 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1228 3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe 784 jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1428 wrote to memory of 784 1428 taskeng.exe 28 PID 1428 wrote to memory of 784 1428 taskeng.exe 28 PID 1428 wrote to memory of 784 1428 taskeng.exe 28 PID 1428 wrote to memory of 784 1428 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe"C:\Users\Admin\AppData\Local\Temp\3bea71d45791a91033323dca0480e1be92e46fd1a621c2668eb8d474e9bc6d83.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1228
-
C:\Windows\system32\taskeng.exetaskeng.exe {F3F73823-D8A6-4239-B7D7-78C7A9CC7FC5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5883254ba363740367062521dd3df088c
SHA1969cd87c4481075d011938d946cc91a8faf607bd
SHA2568873b37863683b57882448c3e2808b48baf672689e3c2cd1e7fc3ae228f007bf
SHA5128a8ffb2a389668f0dad581144498220b1560d2cfa625a7449287a95b57e9ad0bd581080026afb66087ef922c53263572b04eac2916864005ceacce1032252fc2
-
Filesize
224KB
MD5883254ba363740367062521dd3df088c
SHA1969cd87c4481075d011938d946cc91a8faf607bd
SHA2568873b37863683b57882448c3e2808b48baf672689e3c2cd1e7fc3ae228f007bf
SHA5128a8ffb2a389668f0dad581144498220b1560d2cfa625a7449287a95b57e9ad0bd581080026afb66087ef922c53263572b04eac2916864005ceacce1032252fc2