Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe
Resource
win10v2004-20240508-en
General
-
Target
75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe
-
Size
69KB
-
MD5
968a96b3b6c91d61df46db0de51a3f8c
-
SHA1
a395fa3aed97dfc5039860cdf3a3840b60d0b7df
-
SHA256
75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757
-
SHA512
df6bc925e0a59a14f943bf8eade7a8ddff5c5c27be7786da6fb236c84cbb58faca89838e45d8ff4209ada412d1c38017588145cef002d6b141690eb05ebef221
-
SSDEEP
1536:gQTIubHy5wQ5JAejpzkGdxDLw3qMnd1YzHgAB71/pX:R4w6ZpzNdxDL25ELBxX
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2060 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2524 75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe 2524 75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\e93ecae2\jusched.exe 75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe File created C:\Program Files (x86)\e93ecae2\e93ecae2 75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe 2060 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2060 2524 75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe 28 PID 2524 wrote to memory of 2060 2524 75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe 28 PID 2524 wrote to memory of 2060 2524 75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe 28 PID 2524 wrote to memory of 2060 2524 75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe"C:\Users\Admin\AppData\Local\Temp\75d3746241bc79b18fccb6f186049c505fcf841dabbbd3bec189dd105a79c757.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\e93ecae2\jusched.exe"C:\Program Files (x86)\e93ecae2\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
69KB
MD56fd31a21366cba23c7406bb1d98f3a2c
SHA1cdbba03786cd9414d60e548c088e37e65a3b64e6
SHA256309a2b051ccc63e3ce033d75bcdca189e4e4199c3f985e914113f7fcb1b9d325
SHA51261004a74cc400de8447f1ac235f3e110476ac03d36ef36fbd143ec30dd22d8a34e6bcdb64d4387009b92bc3fe41a4ec8babdfaff3efcb7e895bed227ab327a25