Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe
Resource
win10v2004-20220812-en
General
-
Target
d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe
-
Size
36KB
-
MD5
2e79af552fa6d3bd2cb654cc0f15cd76
-
SHA1
6fb5432411473781c8ccdf1e597400bbdc158e47
-
SHA256
d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6
-
SHA512
8a764df6346114fce2a8f68badd94ff840aa1dc3b3e16400e36268789fdcd11fde6baa44d9bfec799426d2add7a8d4166680a0a24bde1297284dbbe3fd4a436b
-
SSDEEP
768:sVIYHMBz+C7PA4pQ3RLB4rHzdfD2W2+6z:sVTHMBzRbahNahbM+6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 jusched.exe -
resource yara_rule behavioral1/memory/1716-65-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1716-67-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1716-68-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1716-71-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1716-72-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1716-76-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1716-77-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1672 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 1672 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Quick Start = "C:\\Users\\Admin\\jusched.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 1716 2036 jusched.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1672 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 2036 jusched.exe 1716 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2036 1672 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 27 PID 1672 wrote to memory of 2036 1672 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 27 PID 1672 wrote to memory of 2036 1672 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 27 PID 1672 wrote to memory of 2036 1672 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 27 PID 2036 wrote to memory of 1716 2036 jusched.exe 28 PID 2036 wrote to memory of 1716 2036 jusched.exe 28 PID 2036 wrote to memory of 1716 2036 jusched.exe 28 PID 2036 wrote to memory of 1716 2036 jusched.exe 28 PID 2036 wrote to memory of 1716 2036 jusched.exe 28 PID 2036 wrote to memory of 1716 2036 jusched.exe 28 PID 2036 wrote to memory of 1716 2036 jusched.exe 28 PID 2036 wrote to memory of 1716 2036 jusched.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe"C:\Users\Admin\AppData\Local\Temp\d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\jusched.exe"C:\Users\Admin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD52e79af552fa6d3bd2cb654cc0f15cd76
SHA16fb5432411473781c8ccdf1e597400bbdc158e47
SHA256d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6
SHA5128a764df6346114fce2a8f68badd94ff840aa1dc3b3e16400e36268789fdcd11fde6baa44d9bfec799426d2add7a8d4166680a0a24bde1297284dbbe3fd4a436b
-
Filesize
36KB
MD52e79af552fa6d3bd2cb654cc0f15cd76
SHA16fb5432411473781c8ccdf1e597400bbdc158e47
SHA256d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6
SHA5128a764df6346114fce2a8f68badd94ff840aa1dc3b3e16400e36268789fdcd11fde6baa44d9bfec799426d2add7a8d4166680a0a24bde1297284dbbe3fd4a436b
-
Filesize
36KB
MD52e79af552fa6d3bd2cb654cc0f15cd76
SHA16fb5432411473781c8ccdf1e597400bbdc158e47
SHA256d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6
SHA5128a764df6346114fce2a8f68badd94ff840aa1dc3b3e16400e36268789fdcd11fde6baa44d9bfec799426d2add7a8d4166680a0a24bde1297284dbbe3fd4a436b