Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe
Resource
win10v2004-20220812-en
General
-
Target
44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe
-
Size
337KB
-
MD5
15a786b1ef0a0df25f31d5f137c75344
-
SHA1
dbd5f47a0e37913bf3846e37b7971cb36f9735b9
-
SHA256
44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4
-
SHA512
d54fd775e2f46efe5a2fbd999eb7c8a635a793d34b040a18f906301e6b9a7c0353957655ea7de20d30a6afa43b395c5707540f131cb8f73bb019a09329b3c2e2
-
SSDEEP
6144:0dD+O3ld3xTLo1KBujL4adYOWFPA/dwP4zpxL7K3ZqTq2+NjnxYD39tHWPqBICG:YRvxo003TcIpEqO2Mx039RWPqr
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1620-55-0x0000000000400000-0x00000000004D4000-memory.dmp upx behavioral1/memory/732-60-0x0000000000400000-0x00000000004D4000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\jiatBFsn6K40IH1b jiatBFsn6K40IH1b.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1620 44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1620 44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe 732 jiatBFsn6K40IH1b.exe 732 jiatBFsn6K40IH1b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 732 1620 44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe 28 PID 1620 wrote to memory of 732 1620 44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe 28 PID 1620 wrote to memory of 732 1620 44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe 28 PID 1620 wrote to memory of 732 1620 44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe"C:\Users\Admin\AppData\Local\Temp\44109a210d76a133eb102a0bc43ce3eaecbf84291153565feb048a9e506ebed4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\PROGRA~3\jiatBFsn6K40IH1b.exeC:\PROGRA~3\jiatBFsn6K40IH1b.exe2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:732
-