Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe
Resource
win10v2004-20220901-en
General
-
Target
c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe
-
Size
410KB
-
MD5
5cc9d252e73c82d8715007c86835fd40
-
SHA1
583231e28af5fe4e7a99ca8445d6700ec24e463b
-
SHA256
c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb
-
SHA512
cd096141e20a46ff5eeb29a512a2c8e526f9d3ca2dfc33e4eb7b5cf34374ed696aa25cded4d9dcd0c5fbd3cb1b9083e83797a31cc9bdb6230afb9f9da6f6cc17
-
SSDEEP
12288:s7SO7qLdsGPAm5KzTIwisHiUeWnUjbsloBaL:s7LqLiaCDHfejaoUL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 jaygsu.exe -
Deletes itself 1 IoCs
pid Process 2020 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B2FDFC8-3774-AD4D-C411-AE4FF0968D52} = "C:\\Users\\Admin\\AppData\\Roaming\\Azxod\\jaygsu.exe" jaygsu.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run jaygsu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1708 set thread context of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe 2036 jaygsu.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 2036 jaygsu.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2036 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 28 PID 1708 wrote to memory of 2036 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 28 PID 1708 wrote to memory of 2036 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 28 PID 1708 wrote to memory of 2036 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 28 PID 2036 wrote to memory of 1176 2036 jaygsu.exe 18 PID 2036 wrote to memory of 1176 2036 jaygsu.exe 18 PID 2036 wrote to memory of 1176 2036 jaygsu.exe 18 PID 2036 wrote to memory of 1176 2036 jaygsu.exe 18 PID 2036 wrote to memory of 1176 2036 jaygsu.exe 18 PID 2036 wrote to memory of 1276 2036 jaygsu.exe 17 PID 2036 wrote to memory of 1276 2036 jaygsu.exe 17 PID 2036 wrote to memory of 1276 2036 jaygsu.exe 17 PID 2036 wrote to memory of 1276 2036 jaygsu.exe 17 PID 2036 wrote to memory of 1276 2036 jaygsu.exe 17 PID 2036 wrote to memory of 1312 2036 jaygsu.exe 16 PID 2036 wrote to memory of 1312 2036 jaygsu.exe 16 PID 2036 wrote to memory of 1312 2036 jaygsu.exe 16 PID 2036 wrote to memory of 1312 2036 jaygsu.exe 16 PID 2036 wrote to memory of 1312 2036 jaygsu.exe 16 PID 2036 wrote to memory of 1708 2036 jaygsu.exe 22 PID 2036 wrote to memory of 1708 2036 jaygsu.exe 22 PID 2036 wrote to memory of 1708 2036 jaygsu.exe 22 PID 2036 wrote to memory of 1708 2036 jaygsu.exe 22 PID 2036 wrote to memory of 1708 2036 jaygsu.exe 22 PID 1708 wrote to memory of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29 PID 1708 wrote to memory of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29 PID 1708 wrote to memory of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29 PID 1708 wrote to memory of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29 PID 1708 wrote to memory of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29 PID 1708 wrote to memory of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29 PID 1708 wrote to memory of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29 PID 1708 wrote to memory of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29 PID 1708 wrote to memory of 2020 1708 c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe"C:\Users\Admin\AppData\Local\Temp\c7f288f638cb297c90711d808d5213776d2f125a0b7c4779fd59002201eeb7eb.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\Azxod\jaygsu.exe"C:\Users\Admin\AppData\Roaming\Azxod\jaygsu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd3d8471f.bat"3⤵
- Deletes itself
PID:2020
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1276
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD54030e903b3cc4c097d3d1171a3098794
SHA1707acdc73fcc4929067c7f629fb3f69786de7fc8
SHA256029083131debcf9970852f3674ae9678369e7ec46a747b20f2aa82de283c0fec
SHA51273c157a0fd81b18645f5c302d447149db93e4e2ff044a4f9286111accdee281f57a6897e589f50b327f2ea54d705a596a40c6eb85c5a2105e797c290076f260b
-
Filesize
410KB
MD538f00b29d495385172ebfa79c8f74f15
SHA1cd2753dc1210d99a3bd8bbbe1ef3ffab4fbb44e3
SHA256d6471bc60e63456551e22f1d58201eec50c40bc1d238d2d1add43c5624dd8e72
SHA51230feb9f889381d6afd4905d480538759486c1b59bae6d837aac5624d8dd674a879244bde242c4ddc7bf3c246cc5047b417f2480b7fdc5b21308a0df15dd551fb
-
Filesize
410KB
MD538f00b29d495385172ebfa79c8f74f15
SHA1cd2753dc1210d99a3bd8bbbe1ef3ffab4fbb44e3
SHA256d6471bc60e63456551e22f1d58201eec50c40bc1d238d2d1add43c5624dd8e72
SHA51230feb9f889381d6afd4905d480538759486c1b59bae6d837aac5624d8dd674a879244bde242c4ddc7bf3c246cc5047b417f2480b7fdc5b21308a0df15dd551fb
-
Filesize
410KB
MD538f00b29d495385172ebfa79c8f74f15
SHA1cd2753dc1210d99a3bd8bbbe1ef3ffab4fbb44e3
SHA256d6471bc60e63456551e22f1d58201eec50c40bc1d238d2d1add43c5624dd8e72
SHA51230feb9f889381d6afd4905d480538759486c1b59bae6d837aac5624d8dd674a879244bde242c4ddc7bf3c246cc5047b417f2480b7fdc5b21308a0df15dd551fb