Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
36s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
0cfbf68062ff384056fdec2e58af0b2c54d536d652a88e207cf0370382a6f924.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0cfbf68062ff384056fdec2e58af0b2c54d536d652a88e207cf0370382a6f924.exe
Resource
win10v2004-20220812-en
General
-
Target
0cfbf68062ff384056fdec2e58af0b2c54d536d652a88e207cf0370382a6f924.exe
-
Size
157KB
-
MD5
a2833f1f12b0a6821a8cdcccf9259130
-
SHA1
7cc3294971d68fba2d04e82c9c9c0cf98e1e8dd9
-
SHA256
0cfbf68062ff384056fdec2e58af0b2c54d536d652a88e207cf0370382a6f924
-
SHA512
b0b532245297282e5422623554871682f12e7ce80a10f0b55517a20b0d2da08499da81836ced36f12ef80b80ece1a4726f40666e29222d55c86023dcead9c312
-
SSDEEP
3072:g7KEcx/PGumsUbjdor/7BS4e9rPSFgLccpFQSZK+IyrfY2Nmou:gGt/hU1YjBS4A7SqRhjrfYozu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1716 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 0cfbf68062ff384056fdec2e58af0b2c54d536d652a88e207cf0370382a6f924.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1716 1720 taskeng.exe 28 PID 1720 wrote to memory of 1716 1720 taskeng.exe 28 PID 1720 wrote to memory of 1716 1720 taskeng.exe 28 PID 1720 wrote to memory of 1716 1720 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cfbf68062ff384056fdec2e58af0b2c54d536d652a88e207cf0370382a6f924.exe"C:\Users\Admin\AppData\Local\Temp\0cfbf68062ff384056fdec2e58af0b2c54d536d652a88e207cf0370382a6f924.exe"1⤵
- Drops file in Program Files directory
PID:1196
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC5001AD-0C6E-4FD3-A032-91A890EAFC5E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5906a82a1282572102b490aedc999fedc
SHA17c442952357fc4a8cec3ac5a077d384dcdbbcd6b
SHA256de17dae4076d55d619298d203c5b83472267c7a656c8f7bfa0c8d6e1d8a94d49
SHA512d3f6190e1a212b28eedd4a6bd03fef741cc4b5ccb0cd31940026fb5da36d76a4a8c878587a02265f2b519523b6e39c631abe6aab0f78ad77b18d3b1b59da2f2b
-
Filesize
157KB
MD5906a82a1282572102b490aedc999fedc
SHA17c442952357fc4a8cec3ac5a077d384dcdbbcd6b
SHA256de17dae4076d55d619298d203c5b83472267c7a656c8f7bfa0c8d6e1d8a94d49
SHA512d3f6190e1a212b28eedd4a6bd03fef741cc4b5ccb0cd31940026fb5da36d76a4a8c878587a02265f2b519523b6e39c631abe6aab0f78ad77b18d3b1b59da2f2b