Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
8ffa4e0bcc37f03977ee0eb77dae2639cf360bfadfaead0b0fc304d1dbd8a78f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8ffa4e0bcc37f03977ee0eb77dae2639cf360bfadfaead0b0fc304d1dbd8a78f.exe
Resource
win10v2004-20240419-en
General
-
Target
8ffa4e0bcc37f03977ee0eb77dae2639cf360bfadfaead0b0fc304d1dbd8a78f.exe
-
Size
6.7MB
-
MD5
50385df19f957b903a16162568d5d844
-
SHA1
6299602980a42b3b36268581d9f5c1c95edc0c68
-
SHA256
8ffa4e0bcc37f03977ee0eb77dae2639cf360bfadfaead0b0fc304d1dbd8a78f
-
SHA512
b440643a8f8e135e2d14ed786e2d085ca5633e09a26eb9a6058d65fb85da071fffac68de0400a5f8a3d1fd58dbe7c36d4e6b5708213aab2f76117f7600cd0804
-
SSDEEP
196608:iLmZYVW6eOSuI1uJAfiV4Yh/DMsQadFuETY5Wd:iLmr+SuGuCf/w4sQadFuEMO
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2272 anhxrcb.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\anhxrcb.exe 8ffa4e0bcc37f03977ee0eb77dae2639cf360bfadfaead0b0fc304d1dbd8a78f.exe File created C:\PROGRA~3\Mozilla\fqurfhn.dll anhxrcb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 8ffa4e0bcc37f03977ee0eb77dae2639cf360bfadfaead0b0fc304d1dbd8a78f.exe 2272 anhxrcb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2272 2700 taskeng.exe 29 PID 2700 wrote to memory of 2272 2700 taskeng.exe 29 PID 2700 wrote to memory of 2272 2700 taskeng.exe 29 PID 2700 wrote to memory of 2272 2700 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ffa4e0bcc37f03977ee0eb77dae2639cf360bfadfaead0b0fc304d1dbd8a78f.exe"C:\Users\Admin\AppData\Local\Temp\8ffa4e0bcc37f03977ee0eb77dae2639cf360bfadfaead0b0fc304d1dbd8a78f.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
C:\Windows\system32\taskeng.exetaskeng.exe {7620B96C-0EA4-4623-B11E-E76479B76CB7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\PROGRA~3\Mozilla\anhxrcb.exeC:\PROGRA~3\Mozilla\anhxrcb.exe -wxojhrj2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD5683e996bb56a86598d0a6c53c7e6c90c
SHA121baf18d05b85054b7bdad972a42065d81a2baa6
SHA2560438fa6e8fa7f8681bc1df6a94bf7782bd864e349a21ed7b52680469e106a4d5
SHA5127f8534621fc007267405dfe794bf5634cd93e54003d3191dd60f394be2797201058e854782c5989150f713b10bc366fa3fd78faa83c103e0b10fd9db540f4de0