Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
f7a50aad3ada13c7b13c1fe1e82a140e3c31b1dd3810b1bfe7e970371bcff89d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f7a50aad3ada13c7b13c1fe1e82a140e3c31b1dd3810b1bfe7e970371bcff89d.exe
Resource
win10v2004-20220812-en
General
-
Target
f7a50aad3ada13c7b13c1fe1e82a140e3c31b1dd3810b1bfe7e970371bcff89d.exe
-
Size
361KB
-
MD5
6c9bdaf8ca27f8ef0f1cc340d002ecb0
-
SHA1
3576ea4ef8f1e1d189000fb114a414572bafe310
-
SHA256
f7a50aad3ada13c7b13c1fe1e82a140e3c31b1dd3810b1bfe7e970371bcff89d
-
SHA512
083fc8887b05d758691f99c75cb0a96690dc4a509c7adaedefd0a788d0042cda6249714517677582c00937b4133f592420ba94039b929323d814f9e4e56ba175
-
SSDEEP
6144:ktAkOVfKzEdaqmGrEU+jqgPIOEnyyPWWMA9RPjf:yxEdpExqgwpnyyPWNA9RPjf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 524 suxbtjf.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\suxbtjf.exe f7a50aad3ada13c7b13c1fe1e82a140e3c31b1dd3810b1bfe7e970371bcff89d.exe File created C:\PROGRA~3\Mozilla\wkvogyf.dll suxbtjf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1764 f7a50aad3ada13c7b13c1fe1e82a140e3c31b1dd3810b1bfe7e970371bcff89d.exe 524 suxbtjf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 472 wrote to memory of 524 472 taskeng.exe 29 PID 472 wrote to memory of 524 472 taskeng.exe 29 PID 472 wrote to memory of 524 472 taskeng.exe 29 PID 472 wrote to memory of 524 472 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7a50aad3ada13c7b13c1fe1e82a140e3c31b1dd3810b1bfe7e970371bcff89d.exe"C:\Users\Admin\AppData\Local\Temp\f7a50aad3ada13c7b13c1fe1e82a140e3c31b1dd3810b1bfe7e970371bcff89d.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1764
-
C:\Windows\system32\taskeng.exetaskeng.exe {2E15B87D-8B2C-4B82-AD7A-D42F5025D128} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\PROGRA~3\Mozilla\suxbtjf.exeC:\PROGRA~3\Mozilla\suxbtjf.exe -wukznwj2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD5a18526aaa9b99505da8990d0869805b6
SHA14242455c130e6ac2ec89cd212f36601f1daab496
SHA256bff5c4b2c17c0dadc8af92ab435752ce0376eacd26fa27b90476a054801749f4
SHA5122bbd90fdc4a7124192b8fb9c17a0d0dfc3c9216306e1d9e9f8dc90c929be8811123d5344c0b3e7e12f7a3bee4895a6a5335539ee8b00812b35f7a797a8118403
-
Filesize
361KB
MD5a18526aaa9b99505da8990d0869805b6
SHA14242455c130e6ac2ec89cd212f36601f1daab496
SHA256bff5c4b2c17c0dadc8af92ab435752ce0376eacd26fa27b90476a054801749f4
SHA5122bbd90fdc4a7124192b8fb9c17a0d0dfc3c9216306e1d9e9f8dc90c929be8811123d5344c0b3e7e12f7a3bee4895a6a5335539ee8b00812b35f7a797a8118403