Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
5b66c32fd2b8be789d319e3e9dcfa5f9.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
5b66c32fd2b8be789d319e3e9dcfa5f9.exe
Resource
win10v2004-20240226-en
General
-
Target
5b66c32fd2b8be789d319e3e9dcfa5f9.exe
-
Size
229KB
-
MD5
5b66c32fd2b8be789d319e3e9dcfa5f9
-
SHA1
8e0929807dde974fbc5366aa4505086453fabbb1
-
SHA256
34260b064199aece0d4af9b45f01533fcf26b3f965b6c9a7fe65451f0653d49b
-
SHA512
ffbc7d5cd592f952967a469a0e3ee92999dc1e0da39ba9ea1f8e96b154584a60d174039a04903ed1b87fd3d4810105b935a21a0d111fb96e2f2d7ae0af36a09c
-
SSDEEP
3072:R4LLCgTsDAJJRjO6DMhtecMl+Vo0paULFZhh2D+0caj3kyRACXCX:R4LLrJJn2Y+K8Rn9ozXCX
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2848 cwtsudd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\cwtsudd.exe 5b66c32fd2b8be789d319e3e9dcfa5f9.exe File created C:\PROGRA~3\Mozilla\njrippn.dll cwtsudd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2884 5b66c32fd2b8be789d319e3e9dcfa5f9.exe 2848 cwtsudd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2848 2636 taskeng.exe 29 PID 2636 wrote to memory of 2848 2636 taskeng.exe 29 PID 2636 wrote to memory of 2848 2636 taskeng.exe 29 PID 2636 wrote to memory of 2848 2636 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b66c32fd2b8be789d319e3e9dcfa5f9.exe"C:\Users\Admin\AppData\Local\Temp\5b66c32fd2b8be789d319e3e9dcfa5f9.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2884
-
C:\Windows\system32\taskeng.exetaskeng.exe {13325BCD-378F-4DF8-B7A7-99E382BFE402} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\PROGRA~3\Mozilla\cwtsudd.exeC:\PROGRA~3\Mozilla\cwtsudd.exe -ldxtpdk2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5df7c2f7e8f6d27806f59deae312e141e
SHA1358a278d14f9c196d2cf7d29a1e66b46e5a7175c
SHA2562176cd312ce1e845a7c2d36fba9ba600f963b3f1fd0e6c8423b705da603fb765
SHA512d3627404b568819fcecd8b42930beb2351f460167cf48e4b17f28173f4a739a9a526b7276de95cb79747ae5111939816f27745350c6025e6f704b4176b19de4c