Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
0cb42e9ad739c9babef32fa029598000N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0cb42e9ad739c9babef32fa029598000N.exe
Resource
win10v2004-20240709-en
General
-
Target
0cb42e9ad739c9babef32fa029598000N.exe
-
Size
129KB
-
MD5
0cb42e9ad739c9babef32fa029598000
-
SHA1
fe40949c9b47cbd3822b0934a95c171d3b60a1a6
-
SHA256
2e698586e4341da73b89c74db4e275bf1c73dc99186ce01ec5a378d68c422ed8
-
SHA512
fab95aec976083931e4348678ddcc623545043709b92c2c102c4438d0ba81938a1976e0225e1c76c53d26b0a9fc1e9369c34baa93dd88db503ec1d7f1df05a8a
-
SSDEEP
3072:knZjfso0f5z9f57fgDWChiOzl0LEnFvUf4FnWRYCdB:kndp0f5z77fgDNlzl0L0dUf2WRNdB
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2008 qrggcen.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\qrggcen.exe 0cb42e9ad739c9babef32fa029598000N.exe File created C:\PROGRA~3\Mozilla\zwjbghb.dll qrggcen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2008 1256 taskeng.exe 32 PID 1256 wrote to memory of 2008 1256 taskeng.exe 32 PID 1256 wrote to memory of 2008 1256 taskeng.exe 32 PID 1256 wrote to memory of 2008 1256 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cb42e9ad739c9babef32fa029598000N.exe"C:\Users\Admin\AppData\Local\Temp\0cb42e9ad739c9babef32fa029598000N.exe"1⤵
- Drops file in Program Files directory
PID:2304
-
C:\Windows\system32\taskeng.exetaskeng.exe {B4B0E0FE-9332-491E-97DD-92D5619300E7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\PROGRA~3\Mozilla\qrggcen.exeC:\PROGRA~3\Mozilla\qrggcen.exe -cochpwl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD5e37fe2bad23583ebf346251e3e5008a8
SHA182b70c22d0dd072bffe97b86279235075ee49021
SHA2565d63611010d3a0c458961f9a26293aec87cd9d61501cb3d5b050d0c34083e3d4
SHA512c320f1d29dda258cb73201446e48635e8d96dd812bd53db08344f6438c5172c5ef913ba46ec533b72d980798d6fa094398d65648afb68c962496a5ce256d2a70