Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
3aed9aa9f38d353c9f18872f45b0eefc56f0a72cfde0db9d221da13e3e743fc7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3aed9aa9f38d353c9f18872f45b0eefc56f0a72cfde0db9d221da13e3e743fc7.exe
Resource
win10v2004-20221111-en
General
-
Target
3aed9aa9f38d353c9f18872f45b0eefc56f0a72cfde0db9d221da13e3e743fc7.exe
-
Size
219KB
-
MD5
f723e2dbd15f6a79fa1697bb08e39c80
-
SHA1
a3b738b50e1bf199ea2bb80d9bbe79b9e6df7bc1
-
SHA256
3aed9aa9f38d353c9f18872f45b0eefc56f0a72cfde0db9d221da13e3e743fc7
-
SHA512
9db8956228724b22afe5863ed6c843fe32ea54a8bc10912931508a777b075c72b055a8297c2b5e19b1e9156002772ca8e1fada9785a2c2dd7130b2b48ca1eb99
-
SSDEEP
3072:oiVZBM1JrvMALni0db/WJIV133rYIjTKEJV/R6xEjWswRdpK:oiV3M7tO0BWuVHj2EItHp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1544 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 3aed9aa9f38d353c9f18872f45b0eefc56f0a72cfde0db9d221da13e3e743fc7.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1492 3aed9aa9f38d353c9f18872f45b0eefc56f0a72cfde0db9d221da13e3e743fc7.exe 1544 jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 276 wrote to memory of 1544 276 taskeng.exe 28 PID 276 wrote to memory of 1544 276 taskeng.exe 28 PID 276 wrote to memory of 1544 276 taskeng.exe 28 PID 276 wrote to memory of 1544 276 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aed9aa9f38d353c9f18872f45b0eefc56f0a72cfde0db9d221da13e3e743fc7.exe"C:\Users\Admin\AppData\Local\Temp\3aed9aa9f38d353c9f18872f45b0eefc56f0a72cfde0db9d221da13e3e743fc7.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1492
-
C:\Windows\system32\taskeng.exetaskeng.exe {56019283-6A09-4C33-82F5-9620522016AA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:276 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD5160092b416d00ce30c24bfd180048ce2
SHA19b5e265f6f69585574a47071fb58a7a2484860b5
SHA256af3960018b92f162fd4086133dd42fcd21aa564f20e2b632b63b458b9150b29b
SHA512b4b2777b8611fbf73f8e95b6eb072dad83a7526e06ed9166cc44ad7676a3dafdb4803f22786d9b8aa272d1d49d7898835c0b275d403731d0cbafaf768b8eed2d
-
Filesize
219KB
MD5160092b416d00ce30c24bfd180048ce2
SHA19b5e265f6f69585574a47071fb58a7a2484860b5
SHA256af3960018b92f162fd4086133dd42fcd21aa564f20e2b632b63b458b9150b29b
SHA512b4b2777b8611fbf73f8e95b6eb072dad83a7526e06ed9166cc44ad7676a3dafdb4803f22786d9b8aa272d1d49d7898835c0b275d403731d0cbafaf768b8eed2d