Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_aca4a3ca920ff0313cf1b2088897dc40.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_aca4a3ca920ff0313cf1b2088897dc40.exe
Resource
win10v2004-20231222-en
General
-
Target
VirusShare_aca4a3ca920ff0313cf1b2088897dc40.exe
-
Size
447KB
-
MD5
aca4a3ca920ff0313cf1b2088897dc40
-
SHA1
2a9be876910cafacb97b231cd93f3ad2e51762ce
-
SHA256
9f872293b7b32df6933a8657c66a699a54501fb20a9faa9d0156a464baf38017
-
SHA512
a4c3cde96cb0fc0f44bff96ceb7acb8fcfc32bfd38c8072188e578a258262faa133ab007a48d0fbbbd28b134f3ca0fecd8c7128fa84b7e2ffec994f99f529e7b
-
SSDEEP
6144:PoB3dxc3KfaglVYNxsB+pREpqqBdSNNPSO+8y90Pz/Tr/LyY2i8AyW+uCarimksk:FmuWpqlNPSO+NGzLSZiHF46bHsii
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2780 yygqtli.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\yygqtli.exe VirusShare_aca4a3ca920ff0313cf1b2088897dc40.exe File created C:\PROGRA~3\Mozilla\tsbhrzd.dll yygqtli.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2780 2680 taskeng.exe 29 PID 2680 wrote to memory of 2780 2680 taskeng.exe 29 PID 2680 wrote to memory of 2780 2680 taskeng.exe 29 PID 2680 wrote to memory of 2780 2680 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_aca4a3ca920ff0313cf1b2088897dc40.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_aca4a3ca920ff0313cf1b2088897dc40.exe"1⤵
- Drops file in Program Files directory
PID:1648
-
C:\Windows\system32\taskeng.exetaskeng.exe {A30AAF2E-88D0-4D68-AE21-52672A74567F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\PROGRA~3\Mozilla\yygqtli.exeC:\PROGRA~3\Mozilla\yygqtli.exe -kvhfiah2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
447KB
MD5b5dd2fce8e5cb618e54634abcb8537c9
SHA1c682247677c1f3c6cf6380220d2cb80486744b8f
SHA256ec314c726babda56d771f904c3000357ff07bcdc38d8ebca0cc56a83bea7f8c3
SHA51274130ca11c6d0e6a1d6aa4ccdf89621dd928f78d51eeaaf05d1eca78bd5e5afc085fd834d3e43a1af269c2b3fca5bc87e7fea83b332b62b5a622403b026a329f