Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe
Resource
win10v2004-20220812-en
General
-
Target
f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe
-
Size
35KB
-
MD5
84a6ecada6bd33e6b5a7cb81e5477580
-
SHA1
bd78ef42b5058b7e60ac18f813c76aa62590f5a1
-
SHA256
f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6
-
SHA512
7cfe589829044612d461eda4692601340a5e865266feb294249903ff2bcbcb7520cc0478e14f6e67d7a510c7f3596c4556d9930bcd433f4c22b8cd962c6a78a9
-
SSDEEP
768:JwS9cpS5ipComcPcFpcuWjQyr3eWovq2ARwvQ7QF:JwfpSEvm+cFpcuWjQyr3eWovq2ARwvQq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 828 rekgernel.exe -
Loads dropped DLL 1 IoCs
pid Process 1200 f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 828 1200 f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe 27 PID 1200 wrote to memory of 828 1200 f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe 27 PID 1200 wrote to memory of 828 1200 f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe 27 PID 1200 wrote to memory of 828 1200 f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe"C:\Users\Admin\AppData\Local\Temp\f62485ff54fa9807f64cf47c66b4eff33b0b86e39d129af56714c8378e9fb3f6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\rekgernel.exeC:\Users\Admin\AppData\Local\Temp\rekgernel.exe2⤵
- Executes dropped EXE
PID:828
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5d948d55ae90472426fa5dd7aa108cc73
SHA129af4832e11e1001896eb87a319c3d299fc851fe
SHA256e561c91b5df4aaa9fd6e7a37102a12dafaa59d95f6a93cab4bdb35ca87fc8a61
SHA512daa54629cf9e087bdd72e50c412b4ba1c61ae84bda493dd70ba219ed4184d828b7bf0b0396be940e962178a2f2826fb06017d18983e1c58b3c58e50d6db3a69a
-
Filesize
35KB
MD5d948d55ae90472426fa5dd7aa108cc73
SHA129af4832e11e1001896eb87a319c3d299fc851fe
SHA256e561c91b5df4aaa9fd6e7a37102a12dafaa59d95f6a93cab4bdb35ca87fc8a61
SHA512daa54629cf9e087bdd72e50c412b4ba1c61ae84bda493dd70ba219ed4184d828b7bf0b0396be940e962178a2f2826fb06017d18983e1c58b3c58e50d6db3a69a
-
Filesize
35KB
MD5d948d55ae90472426fa5dd7aa108cc73
SHA129af4832e11e1001896eb87a319c3d299fc851fe
SHA256e561c91b5df4aaa9fd6e7a37102a12dafaa59d95f6a93cab4bdb35ca87fc8a61
SHA512daa54629cf9e087bdd72e50c412b4ba1c61ae84bda493dd70ba219ed4184d828b7bf0b0396be940e962178a2f2826fb06017d18983e1c58b3c58e50d6db3a69a