Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
7f2723903225a8d9b9f029527f0834bd93b2c02a900fbdc53f0bd1d92c43c734.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f2723903225a8d9b9f029527f0834bd93b2c02a900fbdc53f0bd1d92c43c734.exe
Resource
win10v2004-20220812-en
General
-
Target
7f2723903225a8d9b9f029527f0834bd93b2c02a900fbdc53f0bd1d92c43c734.exe
-
Size
254KB
-
MD5
1789fb9affd749ba1bfb12526f396c90
-
SHA1
1c76a3cc965fb1c23357f68ca45d2bc25cf19ea1
-
SHA256
7f2723903225a8d9b9f029527f0834bd93b2c02a900fbdc53f0bd1d92c43c734
-
SHA512
1315f653cadeaa7650c8c73450f54f8af6be805c7daeabc70d3fafe47f022acf3fc2333761efd1fb883167a2c119d08a69f18d122a45c2afca53157f394ee4d2
-
SSDEEP
6144:USH4NMEb+Or4GO30OZ98XdIPxXnlw/xfnj5htL:USH9Eb+E4hRZ98XdoJ4j5hJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1048 jydekdj.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jydekdj.exe 7f2723903225a8d9b9f029527f0834bd93b2c02a900fbdc53f0bd1d92c43c734.exe File created C:\PROGRA~3\Mozilla\xdldjol.dll jydekdj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1396 7f2723903225a8d9b9f029527f0834bd93b2c02a900fbdc53f0bd1d92c43c734.exe 1048 jydekdj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1048 1768 taskeng.exe 29 PID 1768 wrote to memory of 1048 1768 taskeng.exe 29 PID 1768 wrote to memory of 1048 1768 taskeng.exe 29 PID 1768 wrote to memory of 1048 1768 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f2723903225a8d9b9f029527f0834bd93b2c02a900fbdc53f0bd1d92c43c734.exe"C:\Users\Admin\AppData\Local\Temp\7f2723903225a8d9b9f029527f0834bd93b2c02a900fbdc53f0bd1d92c43c734.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1396
-
C:\Windows\system32\taskeng.exetaskeng.exe {759146BA-0296-4B71-85FF-2BE375BA9BEA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\PROGRA~3\Mozilla\jydekdj.exeC:\PROGRA~3\Mozilla\jydekdj.exe -vamlaul2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1048
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5c4acd5b34f2549a065c60392de6f4520
SHA18d9235a140c49889b555f309b297ebcd6733734e
SHA256cee2994fbe515f85cd37a93d2f4de7d3d9187237dd627fc3fa111d5c38103efd
SHA5128e8d91333eb368d8e4785216f2657e7761a035cd6f8cfbd6bcb695f9afc55aeb8d6d505926c11105c32cd2ff88ec8c196cc702f6dbdefc381116c58437641171
-
Filesize
254KB
MD5c4acd5b34f2549a065c60392de6f4520
SHA18d9235a140c49889b555f309b297ebcd6733734e
SHA256cee2994fbe515f85cd37a93d2f4de7d3d9187237dd627fc3fa111d5c38103efd
SHA5128e8d91333eb368d8e4785216f2657e7761a035cd6f8cfbd6bcb695f9afc55aeb8d6d505926c11105c32cd2ff88ec8c196cc702f6dbdefc381116c58437641171