Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
0aa508554173433adc6bba309a200775ba4fa7ff79efea97196018ce79410fbd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0aa508554173433adc6bba309a200775ba4fa7ff79efea97196018ce79410fbd.exe
Resource
win10v2004-20221111-en
General
-
Target
0aa508554173433adc6bba309a200775ba4fa7ff79efea97196018ce79410fbd.exe
-
Size
610KB
-
MD5
0a1e5a7a20553e740738aac0c4f05e00
-
SHA1
e6c33483a7b5d6fc156883fd402e0ba51af9f444
-
SHA256
0aa508554173433adc6bba309a200775ba4fa7ff79efea97196018ce79410fbd
-
SHA512
c1247af96c65a22415d8796276316e628c1b6bbd2ce286cf5da991f55af48feaeee0cf8cc8950a9a6ecf4a737742e6184feb6470aba06d4278b4c23fafc58d93
-
SSDEEP
12288:iXk0E1Av7e/nS7Rh6nrCrQG+txCP1KS5wYV/h:90oAC/2OrMYHUcS7J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1100 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 0aa508554173433adc6bba309a200775ba4fa7ff79efea97196018ce79410fbd.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1100 1936 taskeng.exe 28 PID 1936 wrote to memory of 1100 1936 taskeng.exe 28 PID 1936 wrote to memory of 1100 1936 taskeng.exe 28 PID 1936 wrote to memory of 1100 1936 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aa508554173433adc6bba309a200775ba4fa7ff79efea97196018ce79410fbd.exe"C:\Users\Admin\AppData\Local\Temp\0aa508554173433adc6bba309a200775ba4fa7ff79efea97196018ce79410fbd.exe"1⤵
- Drops file in Program Files directory
PID:1448
-
C:\Windows\system32\taskeng.exetaskeng.exe {437C3836-1C6C-41A2-9274-AB0DB41FF0A0} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610KB
MD5b362e901eca0de97dd727d346b6812d0
SHA1120160282b3f6d6c03556db7d3dbe43772a85c80
SHA256a56702e07266ab5889e2b80f9707c7f3d93fb51a7379569962c5bed9ee549dfa
SHA5122c49cb012f5b3c19d7302017c2433ec37617efe58a9712c7753bdcd09b296943e4d186f965d03e6b6aeba9751d8661ead38b2b9352a31b10f9895e5ee47b8926
-
Filesize
610KB
MD5b362e901eca0de97dd727d346b6812d0
SHA1120160282b3f6d6c03556db7d3dbe43772a85c80
SHA256a56702e07266ab5889e2b80f9707c7f3d93fb51a7379569962c5bed9ee549dfa
SHA5122c49cb012f5b3c19d7302017c2433ec37617efe58a9712c7753bdcd09b296943e4d186f965d03e6b6aeba9751d8661ead38b2b9352a31b10f9895e5ee47b8926