Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
44351af79b24e580f9b8275ea7480fcbda0e0d0b8f0843334ed9f6c9dce9cf15.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
44351af79b24e580f9b8275ea7480fcbda0e0d0b8f0843334ed9f6c9dce9cf15.exe
Resource
win10v2004-20220812-en
General
-
Target
44351af79b24e580f9b8275ea7480fcbda0e0d0b8f0843334ed9f6c9dce9cf15.exe
-
Size
247KB
-
MD5
1d4af3bc614b03df60e0ca358c82b570
-
SHA1
13d25fd39db9aa0dbf3b3fbc1af438bbc46ea727
-
SHA256
44351af79b24e580f9b8275ea7480fcbda0e0d0b8f0843334ed9f6c9dce9cf15
-
SHA512
757903ed5ed679503b81789f537e6fb8124c171e96f6ab14cb1ec15e4c7f7f9468c68019780155631aa75e16244ac8b79cb59f0bcb0d824a4c597f9d5c095f7f
-
SSDEEP
6144:fRh8kXpF13fIRj2N0cp7Yfh2xrtAbUR6A8U5Ccyz/dhZ:L/D6d+j9YmAbURT8U5RyhhZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 848 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 44351af79b24e580f9b8275ea7480fcbda0e0d0b8f0843334ed9f6c9dce9cf15.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1484 wrote to memory of 848 1484 taskeng.exe 29 PID 1484 wrote to memory of 848 1484 taskeng.exe 29 PID 1484 wrote to memory of 848 1484 taskeng.exe 29 PID 1484 wrote to memory of 848 1484 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\44351af79b24e580f9b8275ea7480fcbda0e0d0b8f0843334ed9f6c9dce9cf15.exe"C:\Users\Admin\AppData\Local\Temp\44351af79b24e580f9b8275ea7480fcbda0e0d0b8f0843334ed9f6c9dce9cf15.exe"1⤵
- Drops file in Program Files directory
PID:1280
-
C:\Windows\system32\taskeng.exetaskeng.exe {15CD5328-37FC-4AD2-9F4A-B007E8C8A588} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD59aa7ae2f2507731e90ed0453639541e8
SHA1b79185bdf5c6ecbdd76a54cdd8f724a93299545b
SHA2566f48a6af2a0d6c1a38e7eb9258ec96c547397fa991e87602a5b436c54e7df91a
SHA5125c2158d578f2578e8a2460de774747085c5065fbd7f4fc7d470697f3e3f83cfb04b800faa4c2ba77d07663fdaaa05b52b312253bb39ff08d27b882f7e47d11a2
-
Filesize
247KB
MD59aa7ae2f2507731e90ed0453639541e8
SHA1b79185bdf5c6ecbdd76a54cdd8f724a93299545b
SHA2566f48a6af2a0d6c1a38e7eb9258ec96c547397fa991e87602a5b436c54e7df91a
SHA5125c2158d578f2578e8a2460de774747085c5065fbd7f4fc7d470697f3e3f83cfb04b800faa4c2ba77d07663fdaaa05b52b312253bb39ff08d27b882f7e47d11a2