Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
d6bf20a5e07be2c1a234b034f25b1bebf7774437915c1678442082a63ee8ee5d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d6bf20a5e07be2c1a234b034f25b1bebf7774437915c1678442082a63ee8ee5d.exe
Resource
win10v2004-20240412-en
General
-
Target
d6bf20a5e07be2c1a234b034f25b1bebf7774437915c1678442082a63ee8ee5d.exe
-
Size
142KB
-
MD5
49dcbe6791db32b29b9b407d5a56519a
-
SHA1
e518601ced073245a436dc4544421bae6ff45182
-
SHA256
d6bf20a5e07be2c1a234b034f25b1bebf7774437915c1678442082a63ee8ee5d
-
SHA512
f337766c247e95d3be9d351871a24c82d279c4cd266576d05903f9c770a214d612f80d8456069cc57dff2b45a1511dcadcfad1ce305e029a8fa43a391e303f36
-
SSDEEP
3072:5gjzzvzm/Z7Uy1tVkBiyyUzGBk9VeFS43tqPJpPseX:Ka/ZT/UKBk749CpX
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2128 anhxrcb.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\anhxrcb.exe d6bf20a5e07be2c1a234b034f25b1bebf7774437915c1678442082a63ee8ee5d.exe File created C:\PROGRA~3\Mozilla\fqurfhn.dll anhxrcb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2128 2008 taskeng.exe 29 PID 2008 wrote to memory of 2128 2008 taskeng.exe 29 PID 2008 wrote to memory of 2128 2008 taskeng.exe 29 PID 2008 wrote to memory of 2128 2008 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6bf20a5e07be2c1a234b034f25b1bebf7774437915c1678442082a63ee8ee5d.exe"C:\Users\Admin\AppData\Local\Temp\d6bf20a5e07be2c1a234b034f25b1bebf7774437915c1678442082a63ee8ee5d.exe"1⤵
- Drops file in Program Files directory
PID:1724
-
C:\Windows\system32\taskeng.exetaskeng.exe {4A4D903B-0371-4F70-AE45-AD97CE52637C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\PROGRA~3\Mozilla\anhxrcb.exeC:\PROGRA~3\Mozilla\anhxrcb.exe -wxojhrj2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD5805656af450de78c5c8978e927c071f6
SHA189167b47e9be0a76f56fa0d97c9f8f74f27564a9
SHA2569593315ce5d4d19930276ebd06d0db554e8c588f318ca6ad96260b9cf9b4f9b6
SHA51242996bc7fbad5087587ac69cdbce2ccdd4c2a6e1e84e3b39f8b696480df56c063daba8509efad563df8a2fc219adf7a40ba93e13c4583adc3bf03fed6a3c49ed