Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
265s -
max time network
320s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:41
Behavioral task
behavioral1
Sample
1269132bab2e13125eb368531b010039.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1269132bab2e13125eb368531b010039.exe
Resource
win10v2004-20231215-en
General
-
Target
1269132bab2e13125eb368531b010039.exe
-
Size
219KB
-
MD5
1269132bab2e13125eb368531b010039
-
SHA1
0bf11c5c4b491589d5a80222ff1c2ba054013cd2
-
SHA256
bdcee4aff241d86bb674ea37bccf2ee9107b9c77bf75a241caad161af9cb8789
-
SHA512
82ed70558b97dd36f45288d571f096aa456cca5415268c3a5c5385d808c684ccc38bc4f499811a4617621322c045f71224454e30cb0eeece0c3b3a57d3adf01f
-
SSDEEP
3072:HusMdsG4h2QnZsPm+FFDmVLNW4R6UwUa0I0S7lIPvCdbCNHkCiPxiU16jwKc:HTMdnEl+hFMBWne1SSP6nCi1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1484 Bjurea.exe -
resource yara_rule behavioral1/memory/476-0-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/476-1-0x00000000002E0000-0x0000000000353000-memory.dmp upx behavioral1/memory/476-4-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/files/0x0038000000016262-15.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\Z30KYPG3WS = "C:\\Windows\\Bjurea.exe" Bjurea.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 1269132bab2e13125eb368531b010039.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 1269132bab2e13125eb368531b010039.exe File created C:\Windows\Bjurea.exe 1269132bab2e13125eb368531b010039.exe File opened for modification C:\Windows\Bjurea.exe 1269132bab2e13125eb368531b010039.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main Bjurea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe 1484 Bjurea.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 476 1269132bab2e13125eb368531b010039.exe 1484 Bjurea.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 476 1269132bab2e13125eb368531b010039.exe Token: SeBackupPrivilege 476 1269132bab2e13125eb368531b010039.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 476 1269132bab2e13125eb368531b010039.exe 1484 Bjurea.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 476 wrote to memory of 1484 476 1269132bab2e13125eb368531b010039.exe 27 PID 476 wrote to memory of 1484 476 1269132bab2e13125eb368531b010039.exe 27 PID 476 wrote to memory of 1484 476 1269132bab2e13125eb368531b010039.exe 27 PID 476 wrote to memory of 1484 476 1269132bab2e13125eb368531b010039.exe 27 PID 476 wrote to memory of 1484 476 1269132bab2e13125eb368531b010039.exe 27 PID 476 wrote to memory of 1484 476 1269132bab2e13125eb368531b010039.exe 27 PID 476 wrote to memory of 1484 476 1269132bab2e13125eb368531b010039.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1269132bab2e13125eb368531b010039.exe"C:\Users\Admin\AppData\Local\Temp\1269132bab2e13125eb368531b010039.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\Bjurea.exeC:\Windows\Bjurea.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD51269132bab2e13125eb368531b010039
SHA10bf11c5c4b491589d5a80222ff1c2ba054013cd2
SHA256bdcee4aff241d86bb674ea37bccf2ee9107b9c77bf75a241caad161af9cb8789
SHA51282ed70558b97dd36f45288d571f096aa456cca5415268c3a5c5385d808c684ccc38bc4f499811a4617621322c045f71224454e30cb0eeece0c3b3a57d3adf01f
-
Filesize
344B
MD5be1098dceacf89dd42d40d97445c0a90
SHA1dfe2f1fb21def86216273adcf76c3380aba793a3
SHA256d5f9dec0a1971117e0d6a2a6ef19370ee3c3f6015dd4189d324bbbd5384ca03a
SHA512a29a75910948517207ad020f8d0d0edd54777ca7c65d5183c1bc4d6b1544a6541783d4fc10181eaca89ef9a33c28c361472169e986b285e3165e8102174d8864