Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
280s -
max time network
309s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
01/01/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165.exe
Resource
win10-20231215-en
General
-
Target
e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165.exe
-
Size
5.3MB
-
MD5
97f28fc0ad22bd6edb9ab6ef96ded82e
-
SHA1
fb2797eb0c08c440e0d8dd5c076eb4833f86ce1f
-
SHA256
e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165
-
SHA512
0ca7a767bce16c793115036d14a108afc992b2c7418e47885aa5fb710239e97a7cbf35e85a46f8966b9bb48b26eb466439f933d9e1f165dc7530a4741b7c81fd
-
SSDEEP
98304:dwpbeh4p9ph30bTpDji7yejCO3vtY14TFSbYTrkXkHVC5f9robTL9dm4vlYYph8r:d8p9ph3oTli7HVVNxOO7H45f9UZU4NYz
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 208 XRJNZC.exe 4068 XRJNZC.exe 2012 XRJNZC.exe 4328 XRJNZC.exe 2372 XRJNZC.exe 3804 XRJNZC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3676 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4836 timeout.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1112 wrote to memory of 4660 1112 e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165.exe 74 PID 1112 wrote to memory of 4660 1112 e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165.exe 74 PID 1112 wrote to memory of 4660 1112 e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165.exe 74 PID 4660 wrote to memory of 4836 4660 cmd.exe 75 PID 4660 wrote to memory of 4836 4660 cmd.exe 75 PID 4660 wrote to memory of 4836 4660 cmd.exe 75 PID 4660 wrote to memory of 208 4660 cmd.exe 76 PID 4660 wrote to memory of 208 4660 cmd.exe 76 PID 4660 wrote to memory of 208 4660 cmd.exe 76 PID 208 wrote to memory of 3676 208 XRJNZC.exe 78 PID 208 wrote to memory of 3676 208 XRJNZC.exe 78 PID 208 wrote to memory of 3676 208 XRJNZC.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165.exe"C:\Users\Admin\AppData\Local\Temp\e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\suw.0.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4836
-
-
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f4⤵
- Creates scheduled task(s)
PID:3676
-
-
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:4068
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:2012
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:4328
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:2372
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5cec1d410c0c8e66629ad994e185e91a8
SHA14135355690422bd799e3aa2f3421a3dd519d278d
SHA25620d82cfb856cbee0c46fe33755fdbe180433c1fd1f6979c0d092e8d8532ce680
SHA512aa7b85323d10e6d8d727a9c1fd9b88605bb28d8d66d3948cf424bfd61211d53a6addb113918b253c9c3dfa2f7b344232fb074a251f557baec1b6e215700dc569
-
Filesize
1.4MB
MD5a68638b87d2d7758eef47e4a7bab2971
SHA18fd24e77cef8b82ff448d61b417c3f1b7824831c
SHA2561ad6558d9ce4f91720df78552a3ea01a6108ff5b3e0de51a9e469ccdf7d6bbd5
SHA5122cfe2ec0aa7bf60d8bd287acbec0a56e78e3568ffe15a5964e66d8a9a69373249ddd310275e5824ef4db58dbec78c0e43561085a0d5d4c21b37c2916b84c3721
-
Filesize
301KB
MD50885bd4c3d0cc4582134b1b73b48f93e
SHA1bffcc27ac17f340d6f4bb8a0fe658b9c808bbce9
SHA256a09901277df0ea086bfceffb795440522c9797c8fedbe3453d33b7de002b6cff
SHA5120fa90facdd0a672a2bb0e43249d456c68aa89397bf40faa35cd796d4db614f6af3f324d8bfe33eb7dc4e80f456c868b1cda810f002b3bafeb63696f6febafd7e
-
Filesize
3.2MB
MD568b1ef420e7fc45dcad7830dcb806c3c
SHA140128f225c6bc209617eb0f760c0fb451e2639a7
SHA2560cc3aa3f177ef455121988e86d9d1a011ae0c813dbb028062b0c109d89d701ab
SHA512eec1887b7a0ce7d82f4bc823f4b952ee30a25f469435055bb6002639181d4ed91b05698f9bbc768986689cc2316e21b9b0663d1b97dc7386215ad00a07a407fc
-
Filesize
5.3MB
MD597f28fc0ad22bd6edb9ab6ef96ded82e
SHA1fb2797eb0c08c440e0d8dd5c076eb4833f86ce1f
SHA256e8a14fa7733f03765f5c28a02b8057862ffc5d26195f3e717970d648b065a165
SHA5120ca7a767bce16c793115036d14a108afc992b2c7418e47885aa5fb710239e97a7cbf35e85a46f8966b9bb48b26eb466439f933d9e1f165dc7530a4741b7c81fd
-
Filesize
174B
MD542f288f1f69bb5d6970b913bde54c8d7
SHA14d32249e8766aa0633f8bd0f1c60e0a1ca570b1e
SHA256a2cadbb66e1f9ad1949471758aa8938ca633ecacded035a6b2f50937c8119270
SHA512916db5d8f7d068283e5badff20f94166b8e5e36ca9f8d265e2abbe38d139d19495469b70d1120c74f43799ee33d898084eec438f3b64d9fcfbfccbdffc9485b7