Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe
Resource
win10v2004-20240508-en
General
-
Target
16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe
-
Size
932KB
-
MD5
12b455eb5ccec5126b4044d3841b8d8a
-
SHA1
c46d43d025615176c655961de2c1c1b930e9af4a
-
SHA256
16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712
-
SHA512
2be80e1db037f65de3211040fc6dd56af601e7e8abd34c5d7c0c6c641bcdf3cb62071fe404642d24173d023357352913b3172a6f86085159622180d085ad40fb
-
SSDEEP
12288:x1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdA8KUt9irOKb:x1/aGLDCM4D8ayGMZo8/s4pKB82VRt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2100 rjoei.exe -
Loads dropped DLL 2 IoCs
pid Process 2460 16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe 2460 16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\rjoei.exe" rjoei.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2100 2460 16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe 28 PID 2460 wrote to memory of 2100 2460 16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe 28 PID 2460 wrote to memory of 2100 2460 16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe 28 PID 2460 wrote to memory of 2100 2460 16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe"C:\Users\Admin\AppData\Local\Temp\16a3268f1c0348c2eca89f2415f698dce258038d595e3714cf1f1a49ba900712.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\ProgramData\rjoei.exe"C:\ProgramData\rjoei.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD53a6e67a511b1e082ac078d50e9a43a3c
SHA1e5487371cb5badeb1ef0b5e4c36399f62377bdc5
SHA256e04f3044bb17aad898f48b291c08f2e99cd517c9b75434b221b9953ccd9fdf9d
SHA512187f9799d007175934d5a1daaf45d13326ef52015aa488500377943af3fef1ca4ead4ea0b678f8c82c52bec72bdb33d2dc782c61509d0f679217e22a202ebab1
-
Filesize
477KB
MD5c928d3c9d30a4c03c53fe1245e6a641b
SHA1dcd775254e306bad9c6a78dfa6fc427b180617b2
SHA2560ce5efa62386defc5efe3a6940a31c4f29a8e09c2e7ce3455c4e6976666cdeb1
SHA5120f982b289a3ac85476bdbeda1fb8adfd6479daaed20cf2de1e7def4479d7fe255623f34ccf11a5408067c791bd64f61bcea701f31fa2c00ec064d3ef22e39e4e
-
Filesize
454KB
MD5586262825fc0a0adb21119d536507b6e
SHA18ae21e4beb6f4535ea40ce11751ab38de89c7ee8
SHA256c82e491abe52b37729e2dcdaf19fb3e5bc6423450cc783a0d50eab7fcb7ac1fb
SHA51254a95e3cda436f54b3fb93c62d39d4b053f300bed164bd793bf3c8ce9f630377813242d129618380ab5e75831868cbb68ab5d7192fda3f66ed22b525d452913c