Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2025, 18:40
Behavioral task
behavioral1
Sample
ECFHIJKJKF.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ECFHIJKJKF.exe
Resource
win10v2004-20250217-en
General
-
Target
ECFHIJKJKF.exe
-
Size
2.7MB
-
MD5
d4f872f71cebfc96d63b8fd16fe59ff3
-
SHA1
249c011ffde1ea311d394e989cc4386f550c682b
-
SHA256
192c8443cd0910ef43c8b86e00ea336fcd8c83b1b236d5cd4386ce37b1eda168
-
SHA512
d367cb6ed066ebbc93a7c7e0cf5cbe28a8fd0f08f67c619b1539045e8ca41d1f3a7a3a9985d4e981e1eadf5be4c318eccb7613ab27b863098ad0b29219feba66
-
SSDEEP
49152:eam9wInUiMWR4bufkBqSk9K5+mUv+F42YcCmph7XZhak:HjMoXUWF4Fmr7XZha
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral2/memory/4436-1-0x0000000000400000-0x00000000006B1000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ECFHIJKJKF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4436 ECFHIJKJKF.exe 4436 ECFHIJKJKF.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4436 wrote to memory of 4168 4436 ECFHIJKJKF.exe 85 PID 4436 wrote to memory of 4168 4436 ECFHIJKJKF.exe 85 PID 4436 wrote to memory of 4168 4436 ECFHIJKJKF.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ECFHIJKJKF.exe"C:\Users\Admin\AppData\Local\Temp\ECFHIJKJKF.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- System Location Discovery: System Language Discovery
PID:4168
-