Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe
Resource
win10v2004-20220901-en
General
-
Target
787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe
-
Size
124KB
-
MD5
834b5880209a561a83cf9a8f6166ccd9
-
SHA1
db459a0ed98a6a803efb954e5ea525966541a4f2
-
SHA256
787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82
-
SHA512
d10ffcc5eec993123bcfe63c683160e362c79739560a5e883702d51d4ceee5b6e1b96147a0e035ef0ffe47473439c30c252c02f466bf31e57d535035893d0cc7
-
SSDEEP
1536:pNos4ZBjxaPhXv5wmTKTJMPpmn25vPp6xCoJ3fb7C:Dotcv5wqIn25v5ifbO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4932 nujiifaa.exe -
Loads dropped DLL 1 IoCs
pid Process 4932 nujiifaa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" nujiifaa.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\nujiifaa.exe 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3040 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe 3040 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3040 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4528 3040 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe 80 PID 3040 wrote to memory of 4528 3040 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe 80 PID 3040 wrote to memory of 4528 3040 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe 80 PID 4528 wrote to memory of 4932 4528 cmd.exe 82 PID 4528 wrote to memory of 4932 4528 cmd.exe 82 PID 4528 wrote to memory of 4932 4528 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe"C:\Users\Admin\AppData\Local\Temp\787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\nujiifaa.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\nujiifaa.exeC:\Windows\system32\nujiifaa.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:4932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD56c7cdd25c2cb0073306eb22aebfc663f
SHA1a1eba8ab49272b9852fe6a543677e8af36271248
SHA25658280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705
SHA51217344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6
-
Filesize
46KB
MD5d95e464236547d09729acf432377a32f
SHA10ea5b827656c1927fe9cdba258b8eb9959ebb4b4
SHA2564befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee
SHA5122b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123
-
Filesize
46KB
MD5d95e464236547d09729acf432377a32f
SHA10ea5b827656c1927fe9cdba258b8eb9959ebb4b4
SHA2564befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee
SHA5122b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123