Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
218s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
3e7d1567c944571df890567d89bdbebf6ce226f06038fa795ecd6a45bf6ad4a1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3e7d1567c944571df890567d89bdbebf6ce226f06038fa795ecd6a45bf6ad4a1.exe
Resource
win10v2004-20220812-en
General
-
Target
3e7d1567c944571df890567d89bdbebf6ce226f06038fa795ecd6a45bf6ad4a1.exe
-
Size
296KB
-
MD5
1b4d6b786b2f0a1bdd2a6f2de6b94810
-
SHA1
a507b67722aa6a7e7b40ae4b37877abf9de4978f
-
SHA256
3e7d1567c944571df890567d89bdbebf6ce226f06038fa795ecd6a45bf6ad4a1
-
SHA512
f0bdd68a52595a58b037990a18fce6d448469fd2ba07eb4f1f3ce46ce538195c1435bd8c8864982115d635bd961ee3b17281d5dc3bcac7b8197f0952e23b6986
-
SSDEEP
6144:USH4NMEb+Or4GO30OZ98XdIPxXnlw/xfnj5ht1DQUJcM:USH9Eb+E4hRZ98XdoJ4j5hXDQZM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1808 aqlfwcc.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\aqlfwcc.exe 3e7d1567c944571df890567d89bdbebf6ce226f06038fa795ecd6a45bf6ad4a1.exe File created C:\PROGRA~3\Mozilla\yiqzwmf.dll aqlfwcc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 540 3e7d1567c944571df890567d89bdbebf6ce226f06038fa795ecd6a45bf6ad4a1.exe 1808 aqlfwcc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1808 1760 taskeng.exe 29 PID 1760 wrote to memory of 1808 1760 taskeng.exe 29 PID 1760 wrote to memory of 1808 1760 taskeng.exe 29 PID 1760 wrote to memory of 1808 1760 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e7d1567c944571df890567d89bdbebf6ce226f06038fa795ecd6a45bf6ad4a1.exe"C:\Users\Admin\AppData\Local\Temp\3e7d1567c944571df890567d89bdbebf6ce226f06038fa795ecd6a45bf6ad4a1.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:540
-
C:\Windows\system32\taskeng.exetaskeng.exe {EF193376-B2EF-4A2D-8732-EB5F634DAAA4} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\PROGRA~3\Mozilla\aqlfwcc.exeC:\PROGRA~3\Mozilla\aqlfwcc.exe -ielcujk2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD50738a1cfe77e9e2d0ace374c6931bb5c
SHA1d443b6d11b4d3675134a03103511df41f028304e
SHA2562b47e12da2f723c1097ef3ef589bf13b20dcf8b0010e06eeb1df48aa1f08ccb1
SHA512efdb408ea78cf02f5a79aa0df8e7a70df926ef47d63717d6279614f999ef60945bdb37490ae649cd9290cb710057f5332108e3b9d39209d92b00a7830650e3fb
-
Filesize
296KB
MD50738a1cfe77e9e2d0ace374c6931bb5c
SHA1d443b6d11b4d3675134a03103511df41f028304e
SHA2562b47e12da2f723c1097ef3ef589bf13b20dcf8b0010e06eeb1df48aa1f08ccb1
SHA512efdb408ea78cf02f5a79aa0df8e7a70df926ef47d63717d6279614f999ef60945bdb37490ae649cd9290cb710057f5332108e3b9d39209d92b00a7830650e3fb