Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 21:34
Behavioral task
behavioral1
Sample
4d67058746e6da0dbc186166ea9239b2549bdd40d1d16fc4125c1a8c65fdc188.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4d67058746e6da0dbc186166ea9239b2549bdd40d1d16fc4125c1a8c65fdc188.exe
Resource
win10v2004-20240419-en
General
-
Target
4d67058746e6da0dbc186166ea9239b2549bdd40d1d16fc4125c1a8c65fdc188.exe
-
Size
466KB
-
MD5
138f999c13685a126f4beda2706db481
-
SHA1
164add112a94b28dc55a6fc5150eeaa6130b7f54
-
SHA256
4d67058746e6da0dbc186166ea9239b2549bdd40d1d16fc4125c1a8c65fdc188
-
SHA512
473fd2a2c954c0074af3ff455ac9b488e9cbc384e0680169ad644b365e228d431aa16a856abd72d14eb6d4a73e1a48e142944afbaf3944cf0af1ed146eb2d27d
-
SSDEEP
6144:744b7czqmlKa08qvFsRcIk0NLtS1WkrFdxqbEuIGPeRje:E4fiQvlvy3LtCWuboEyB
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral1/memory/1984-0-0x0000000000400000-0x000000000045F000-memory.dmp UPX behavioral1/files/0x002f0000000146e6-5.dat UPX -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2172 gjsfhjk.exe -
resource yara_rule behavioral1/memory/1984-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x002f0000000146e6-5.dat upx behavioral1/memory/2172-7-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\gjsfhjk.exe 4d67058746e6da0dbc186166ea9239b2549bdd40d1d16fc4125c1a8c65fdc188.exe File created C:\PROGRA~3\Mozilla\eurgebe.dll gjsfhjk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 4d67058746e6da0dbc186166ea9239b2549bdd40d1d16fc4125c1a8c65fdc188.exe 2172 gjsfhjk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2172 2728 taskeng.exe 29 PID 2728 wrote to memory of 2172 2728 taskeng.exe 29 PID 2728 wrote to memory of 2172 2728 taskeng.exe 29 PID 2728 wrote to memory of 2172 2728 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d67058746e6da0dbc186166ea9239b2549bdd40d1d16fc4125c1a8c65fdc188.exe"C:\Users\Admin\AppData\Local\Temp\4d67058746e6da0dbc186166ea9239b2549bdd40d1d16fc4125c1a8c65fdc188.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1984
-
C:\Windows\system32\taskeng.exetaskeng.exe {C6C86307-29E2-472F-9EBD-12F10760FBBA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\PROGRA~3\Mozilla\gjsfhjk.exeC:\PROGRA~3\Mozilla\gjsfhjk.exe -tuxiydl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
466KB
MD5f31a2497dc408ece16d210d6b3c9d178
SHA1eaa34fb5dc755e86b3a176a6ca4fb93434d8d038
SHA25628760cef952a9315298682c6a59d9be7a930407ec8774491291cb6fcbd5f1fdf
SHA51275fdcd93418bc1cddbd986e3b9a5991bb3c97f1f669c455b2a6c9807667ce5ee4885c468f53d4eecbbae9b3c63b0ed9af8a59471e63ccb4f3f26575372e2847f