Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 20:32
Behavioral task
behavioral1
Sample
5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe
Resource
win10v2004-20240226-en
General
-
Target
5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe
-
Size
248KB
-
MD5
59d1930d65dccb7a869f1de656f66117
-
SHA1
7b87d2b84144b34b926404e6c4f5f0bda26d9795
-
SHA256
5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d
-
SHA512
da76ceac4c73298395396b442e4e9128e1015779bd003a938796576a5739f36bfba97fbeb215907d1a4d86d55c583a302255bca5d6915c74b63dc94f32cd181e
-
SSDEEP
3072:mW6hAY6DxQKBL+UjcjR/6HAQ8S138WtA7Kzfk0sa73:mW6hINR+Uwl6HlXA78fJsa73
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x000000000043E000-memory.dmp UPX behavioral1/memory/2292-7-0x0000000000400000-0x000000000043E000-memory.dmp UPX behavioral1/files/0x000d0000000122d1-8.dat UPX behavioral1/memory/2916-16-0x0000000000400000-0x000000000043E000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2916 tbckyxk.exe -
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2292-7-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/files/0x000d0000000122d1-8.dat upx behavioral1/memory/2916-16-0x0000000000400000-0x000000000043E000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\tbckyxk.exe 5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2916 1404 taskeng.exe 29 PID 1404 wrote to memory of 2916 1404 taskeng.exe 29 PID 1404 wrote to memory of 2916 1404 taskeng.exe 29 PID 1404 wrote to memory of 2916 1404 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe"C:\Users\Admin\AppData\Local\Temp\5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe"1⤵
- Drops file in Program Files directory
PID:2292
-
C:\Windows\system32\taskeng.exetaskeng.exe {C0809AE8-9C41-4144-A5D8-9BC7CB8FFBB5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5b4da6c15361aa1a294a5bda6bc4f1a22
SHA15ef16b1ffd23af316c1d0ebe7a172658db3c021d
SHA2566f199ce98d04428dd498c3b03dbd128235ff018f02c1ea4c3b01fdb1b3d775a8
SHA512c3be1f56c54e8a2262de3b3aec1776b8c6e66594090a3969e5d90fd08a7e48117642f83202542c82fc649fd533cca6d06bea009351c334a148bd5fc83183a60f