Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
8b950af45d026e18789c05ec82eba1a243f4c89ee5e29409d22d1ec89203ca09.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b950af45d026e18789c05ec82eba1a243f4c89ee5e29409d22d1ec89203ca09.exe
Resource
win10v2004-20240226-en
General
-
Target
8b950af45d026e18789c05ec82eba1a243f4c89ee5e29409d22d1ec89203ca09.exe
-
Size
153KB
-
MD5
067275a3173b1cd26428f62ac90d8fbf
-
SHA1
e2d607b453172828d563f9659c79691f2fc64d04
-
SHA256
8b950af45d026e18789c05ec82eba1a243f4c89ee5e29409d22d1ec89203ca09
-
SHA512
706a13b1b2bec43b3c8aed50646a90612be0c0a6a4733763eb9b4c08572c4778e0d89a5e9f9bab194ba98d63e1df641fc6c36a09689c8bffd3de992f84a6945f
-
SSDEEP
3072:LMftVuhLI/Y34erRHjtWrNf/SQhYFAM5vTK3clMdisNDtI1rmU:t0Y3JdjIrNHFHIOiWDKrmU
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2604 iajbwsg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\iajbwsg.exe 8b950af45d026e18789c05ec82eba1a243f4c89ee5e29409d22d1ec89203ca09.exe File created C:\PROGRA~3\Mozilla\rnnqqck.dll iajbwsg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2604 2492 taskeng.exe 29 PID 2492 wrote to memory of 2604 2492 taskeng.exe 29 PID 2492 wrote to memory of 2604 2492 taskeng.exe 29 PID 2492 wrote to memory of 2604 2492 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b950af45d026e18789c05ec82eba1a243f4c89ee5e29409d22d1ec89203ca09.exe"C:\Users\Admin\AppData\Local\Temp\8b950af45d026e18789c05ec82eba1a243f4c89ee5e29409d22d1ec89203ca09.exe"1⤵
- Drops file in Program Files directory
PID:2176
-
C:\Windows\system32\taskeng.exetaskeng.exe {2A0024FB-7473-4709-821D-3E7336653DF9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\PROGRA~3\Mozilla\iajbwsg.exeC:\PROGRA~3\Mozilla\iajbwsg.exe -zqrqjuc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5be8baf6121b07cffe2581c691799ef8a
SHA1ec1b57653d9ba3ab70b72968276004c31e151d5e
SHA256211e88ca72f90b6842b106a26227cc7bad3732d86aeb27cfe69d2166fe237455
SHA51240784f0d5bcdcceb4007b3bd9b63d85ab45655f61b2ef71c7f6ab67572d137706bb0aab5ccb54dbda0fd02a410a39d2aeefdde6a6e0df2ddae835e057119e226