Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
7c3caed1d850a40e77e2654d19d98d6a36f54382f1992b09c3047465848c5a21.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7c3caed1d850a40e77e2654d19d98d6a36f54382f1992b09c3047465848c5a21.exe
Resource
win10v2004-20221111-en
General
-
Target
7c3caed1d850a40e77e2654d19d98d6a36f54382f1992b09c3047465848c5a21.exe
-
Size
233KB
-
MD5
0a267f63996352a88fe6bca877d36270
-
SHA1
944de8db25cba6506c360033f5dba41b4d3cd916
-
SHA256
7c3caed1d850a40e77e2654d19d98d6a36f54382f1992b09c3047465848c5a21
-
SHA512
92fb3eaefdf2e51ff585c5167cfd91c414942ab1f8184abaa270c4ef36395c79b9246a3acc792d8681d99389b0b64bbdd2617790c05ca06fae6e64371039a4cf
-
SSDEEP
6144:VSH4NMEb+s3T+HcWZOcT/IrqxXnlw/xfnj5htK:VSH9Eb+o/SVTaqJ4j5ho
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1328 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 7c3caed1d850a40e77e2654d19d98d6a36f54382f1992b09c3047465848c5a21.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1352 7c3caed1d850a40e77e2654d19d98d6a36f54382f1992b09c3047465848c5a21.exe 1328 jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1328 1324 taskeng.exe 27 PID 1324 wrote to memory of 1328 1324 taskeng.exe 27 PID 1324 wrote to memory of 1328 1324 taskeng.exe 27 PID 1324 wrote to memory of 1328 1324 taskeng.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c3caed1d850a40e77e2654d19d98d6a36f54382f1992b09c3047465848c5a21.exe"C:\Users\Admin\AppData\Local\Temp\7c3caed1d850a40e77e2654d19d98d6a36f54382f1992b09c3047465848c5a21.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1352
-
C:\Windows\system32\taskeng.exetaskeng.exe {CB1FA215-913C-4EDB-AF46-94EAA2E50D08} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD53004b26c88643f5f3dc87c1ce175df6d
SHA1d535a9c242ee30351d652994378de4c0f7751a18
SHA256091834ce75430fbf64913910960c95c9dc8e9ecd3c0202955363bde20b2f31c5
SHA512259c5ab8a354541b4acac7855377eda2cbde890157c0e5f6015d2b6e3853e95de0fca3de5c4f6ba237bc8d204b5b09dd216e3ac57842f378d784981888d878e6
-
Filesize
233KB
MD53004b26c88643f5f3dc87c1ce175df6d
SHA1d535a9c242ee30351d652994378de4c0f7751a18
SHA256091834ce75430fbf64913910960c95c9dc8e9ecd3c0202955363bde20b2f31c5
SHA512259c5ab8a354541b4acac7855377eda2cbde890157c0e5f6015d2b6e3853e95de0fca3de5c4f6ba237bc8d204b5b09dd216e3ac57842f378d784981888d878e6