Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
8881bbd066f3f8811b5ada9b9841aa910bfbe659f5fa585c0228b88d1c193313.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8881bbd066f3f8811b5ada9b9841aa910bfbe659f5fa585c0228b88d1c193313.exe
Resource
win10v2004-20240226-en
General
-
Target
8881bbd066f3f8811b5ada9b9841aa910bfbe659f5fa585c0228b88d1c193313.exe
-
Size
170KB
-
MD5
22966a7caace817a65ce281e538da130
-
SHA1
b75e3bc1d4c059403ade2d56133f022a05059ab1
-
SHA256
8881bbd066f3f8811b5ada9b9841aa910bfbe659f5fa585c0228b88d1c193313
-
SHA512
d8fc463f9ecc42b41f7c039fcb7f12db12766df9d1c32066e8c94ef91a0b9611bd562ad48eba160ca41198cb9ca3de97d93dcde208874b47510939c82aec084a
-
SSDEEP
3072:dwUtuJp5sgLMnwEK/wZX+xNIidFh8VaSM3eF4MitAdJ3+pJ156:dwUtuD5FYnwEftCNIidr+k3qquJSPw
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2512 ydvbdjf.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\agmxqzf.dll ydvbdjf.exe File created C:\PROGRA~3\Mozilla\ydvbdjf.exe 8881bbd066f3f8811b5ada9b9841aa910bfbe659f5fa585c0228b88d1c193313.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2512 2100 taskeng.exe 29 PID 2100 wrote to memory of 2512 2100 taskeng.exe 29 PID 2100 wrote to memory of 2512 2100 taskeng.exe 29 PID 2100 wrote to memory of 2512 2100 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8881bbd066f3f8811b5ada9b9841aa910bfbe659f5fa585c0228b88d1c193313.exe"C:\Users\Admin\AppData\Local\Temp\8881bbd066f3f8811b5ada9b9841aa910bfbe659f5fa585c0228b88d1c193313.exe"1⤵
- Drops file in Program Files directory
PID:2256
-
C:\Windows\system32\taskeng.exetaskeng.exe {10BE9E29-98F6-4995-9A72-E23BBA49F955} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\PROGRA~3\Mozilla\ydvbdjf.exeC:\PROGRA~3\Mozilla\ydvbdjf.exe -smqpfhe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5b8cb2b0e4216fd5a7bd46b9e6b8812b6
SHA174925fd1dd7e233e1275dcfb47d803b5b37f94ae
SHA2562e74b80d900125bc792f67e14f330de84533e1c98b458c233ded1ec0c9d615f5
SHA5125a06c3eb71ddb0e5c74680c4fd12416e32749a9d5e3129a4afda127c59e94d6f5f7ce871b1ae981c9b08c03421a0054cf7ea12daae1b4d7e60cbfff9422cc3b1