Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
b1690d26daad3ac88748f86b27c8c12a10d474668383d287af216d57cd59082e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1690d26daad3ac88748f86b27c8c12a10d474668383d287af216d57cd59082e.exe
Resource
win10v2004-20220812-en
General
-
Target
b1690d26daad3ac88748f86b27c8c12a10d474668383d287af216d57cd59082e.exe
-
Size
213KB
-
MD5
027c6ebe8c862cf372e87a1e6164fe20
-
SHA1
4e3ebcf41518611d1cc3e1ae57c190bcd7f91261
-
SHA256
b1690d26daad3ac88748f86b27c8c12a10d474668383d287af216d57cd59082e
-
SHA512
d1ce392a6ebb7dc3efac92c820f764bd0e5f61b89250859afede771939ad3d78a57ae3451aa17aef38c3ca33fb2b51cc71ee2a0c8798f5b41a48b78a962df99c
-
SSDEEP
6144:pEjpvYc3YJ/HvD9hTKCyI7TwmdMlL992VKmH33KeJxah2:aVe/v5hGCyB3R2rBm4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1464 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe b1690d26daad3ac88748f86b27c8c12a10d474668383d287af216d57cd59082e.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1464 1264 taskeng.exe 29 PID 1264 wrote to memory of 1464 1264 taskeng.exe 29 PID 1264 wrote to memory of 1464 1264 taskeng.exe 29 PID 1264 wrote to memory of 1464 1264 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1690d26daad3ac88748f86b27c8c12a10d474668383d287af216d57cd59082e.exe"C:\Users\Admin\AppData\Local\Temp\b1690d26daad3ac88748f86b27c8c12a10d474668383d287af216d57cd59082e.exe"1⤵
- Drops file in Program Files directory
PID:1812
-
C:\Windows\system32\taskeng.exetaskeng.exe {17A5403D-B073-451B-B5C5-FBAE6484911C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1464
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5608145dff0c73a3d621f46cf722de00e
SHA1a9522dade2c457c39ea72e932136eb8759c27aca
SHA2565fa64f1932315dc8d1c0ccbf894802fad3abb4cee601362dfbe99b7c5e662af2
SHA5129a24a21cbaec49d3f72f44f1627377ccdbb354dbf85bd0caa1a676365133473ada90d150e67e8da654173e4d49ac6b4c1695ecd19687fe3d617b4d0166d8a810
-
Filesize
213KB
MD5608145dff0c73a3d621f46cf722de00e
SHA1a9522dade2c457c39ea72e932136eb8759c27aca
SHA2565fa64f1932315dc8d1c0ccbf894802fad3abb4cee601362dfbe99b7c5e662af2
SHA5129a24a21cbaec49d3f72f44f1627377ccdbb354dbf85bd0caa1a676365133473ada90d150e67e8da654173e4d49ac6b4c1695ecd19687fe3d617b4d0166d8a810