Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe
Resource
win10v2004-20240226-en
General
-
Target
f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe
-
Size
34KB
-
MD5
f6da37246aa95224ea6d393617093e19
-
SHA1
b760d39479438372eba98e2801b30c1e9561e18f
-
SHA256
f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d
-
SHA512
f547e5686236e3d8006f0be8bd2a9db65e25c63c97cd15fbef47341fb60e3bacf8e51478aa08de0c78aa688f7b231dd32101f4a0fb74553b72474a711b3a05e0
-
SSDEEP
768:9qSqC8+N5ozQQLncwxWmNXMX3cX8wtgg/X/zCtgcgCEX8u/vSXrXrXrXrXrXyHX:9rqfzQQLamN88Fr277777YX
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1736 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe 1680 f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\71203c3\jusched.exe f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe File created C:\Program Files (x86)\71203c3\71203c3 f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe 1736 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1736 1680 f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe 28 PID 1680 wrote to memory of 1736 1680 f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe 28 PID 1680 wrote to memory of 1736 1680 f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe 28 PID 1680 wrote to memory of 1736 1680 f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe"C:\Users\Admin\AppData\Local\Temp\f7ff365b9d69717a32a4450c7879de1bd630ef81cd67ca04ee85675a554ffe7d.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\71203c3\jusched.exe"C:\Program Files (x86)\71203c3\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
34KB
MD549415f1a9acd68cc1167390b43dff547
SHA1af65cf0b2f249d47b0d646cd8a6a9e28adddd4fc
SHA256fa09daf7e0d0f0fd8b4b9fff80cb8460faa573e3ce51d1739736076dd4bbd1ac
SHA5127b1826dbc50d553b65650f4fd86c804644a5f0c753fee8fc0fa39dfaad8d36944311276716cf510aa8dce63c4de5b0b437b7103452a64e7645db3654212e2fa1