Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
9676324180e2624b259fdd443da55262.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9676324180e2624b259fdd443da55262.exe
Resource
win10v2004-20231215-en
General
-
Target
9676324180e2624b259fdd443da55262.exe
-
Size
10KB
-
MD5
9676324180e2624b259fdd443da55262
-
SHA1
b4c54624a4611def7a19ee4373d113cf53c4ebfd
-
SHA256
7053449b958e04e2ecde4c48f76fc76401226bb6d1ec1b384bcd4102e1557ced
-
SHA512
58f1461c9c923e3e6574e6a8201a12c6a8c4bb318de10a2e8cc6db6c011b6525fabb65b94371c43d1e5bde2aa727051df8d54388ded46373d78efa8aa61cb56d
-
SSDEEP
192:I+wLZcz3Jumy2/xRTNnqsLBg1Z9OZtE50lQ3gpdv4DkgUwu0D:I+wLZSJ2gtNnDLBnZaulQQpdwcGD
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qjepri.dll 9676324180e2624b259fdd443da55262.exe File created C:\Windows\SysWOW64\qjepri.dll 9676324180e2624b259fdd443da55262.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 9676324180e2624b259fdd443da55262.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{54123FF1-8371-9834-9021-184518451FA5} 9676324180e2624b259fdd443da55262.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{54123FF1-8371-9834-9021-184518451FA5}\InprocServer32\ = "C:\\Windows\\SysWow64\\qjepri.dll" 9676324180e2624b259fdd443da55262.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{54123FF1-8371-9834-9021-184518451FA5}\InprocServer32\ThreadingModel = "Apartment" 9676324180e2624b259fdd443da55262.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{54123FF1-8371-9834-9021-184518451FA5}\InprocServer32 9676324180e2624b259fdd443da55262.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 9676324180e2624b259fdd443da55262.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1708 9676324180e2624b259fdd443da55262.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2520 1708 9676324180e2624b259fdd443da55262.exe 28 PID 1708 wrote to memory of 2520 1708 9676324180e2624b259fdd443da55262.exe 28 PID 1708 wrote to memory of 2520 1708 9676324180e2624b259fdd443da55262.exe 28 PID 1708 wrote to memory of 2520 1708 9676324180e2624b259fdd443da55262.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9676324180e2624b259fdd443da55262.exe"C:\Users\Admin\AppData\Local\Temp\9676324180e2624b259fdd443da55262.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c C:\DeleteFileDos.bat2⤵PID:2520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD5495949363519ab9378e10fe2160347bd
SHA1d2465edee504606570cd701e5e1b4fc39143f56f
SHA2562a640bbdf706988a1885dad9c274d3c054fa49761a242febe87a69c673da3481
SHA512420186d034501dc6ad25724bd1d60ac6ac9c0f7a09a64b37df324ac19d678c3770a21474ba3fa13b74db1f04ed0133caa05336431f7bfa4bc404bb7b54a4ef8e
-
Filesize
15KB
MD533b499510b2b549df0e182064765cb0e
SHA141c6967e6114f191d3521641907bde616a1396cb
SHA2564ba8fac02244f88da0decb5b160a3857d53c918592da0c3f7d6a1629d7202651
SHA512632cf73e3f297609d87724b82025da44c1a8fb67c93a82a69f2a3e26e6682e2f2645e29dd1d5ff586fc7480920d880153789109db6bdb458148df10ea43095fd