Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe
-
Size
76KB
-
MD5
1baaf4bfd7943e427e3d0e472f4119d0
-
SHA1
8f174f4f282f43af4758454fd46e0427be90c6fa
-
SHA256
9a4c4098645829ae3b5f7830fedd58798ebbf96f0173c90031de1a0d943340d4
-
SHA512
45c6d9efb75c2dbde50298660135a9bcfa57023873f12388f47c1faa1a65145eed319daf80b7dec82a524439d840d65194c1ab104e296cbffad22c21dec6e8cb
-
SSDEEP
1536:jIr3YriYiUi+H++o1eVlXd+8c0GXmvJJNHjLwl50fPGX:jyYti0pXd+8c0GWvJ3Hvwl5l
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 3028 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2252 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2576 NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2252 2576 NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe 28 PID 2576 wrote to memory of 2252 2576 NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe 28 PID 2576 wrote to memory of 2252 2576 NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe 28 PID 2576 wrote to memory of 2252 2576 NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe 28 PID 2576 wrote to memory of 3028 2576 NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe 29 PID 2576 wrote to memory of 3028 2576 NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe 29 PID 2576 wrote to memory of 3028 2576 NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe 29 PID 2576 wrote to memory of 3028 2576 NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:2252
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD593c65a2d29a3f6fc7c703df149637d7f
SHA1a4a27b2eec41990a52a2920818cf940e80fa358d
SHA25675921ea4058e7f9781fed2c5fe0263052d5eb3b192cf5f9fc0e314487d41d5db
SHA5127a22bbda614ee62db2b90a970b6ce67f54fbd7fe6babd77977c0c712d65544db698e7390f97b533912b660ac8f92b05d21d60d07e014a1e1810d25faa24ab176
-
Filesize
76KB
MD5fcc395a83a66b4bbe334559989404de9
SHA13156b54e9d0e0531aae8b49a986097e375838b8d
SHA256d9be7c9332b454156b6acae0738526520d4314062435c05d51bed30128481077
SHA51297ce3b8e9e7b715e898359e3b10f76da2dc246e03852603c9d4887a518054a6c7bdc44aba8bcbb8899354706f7809e795f92ced6a994dbe67bb89c0bc265ab8b
-
Filesize
290B
MD52829016e1543e25208f35abfdcd1d194
SHA1e5161f37954516b7890803958b86319e2ad423ed
SHA256b79e1f32da9646465f7235158e73edaaad259fe47e38e2ca0d3122bffe9acff3
SHA512d7031ab1f94e3eb4ff39f8cb630011934f0fb9ca723aad8d5f9ec488d77f1a0cb23ecc3b6e4dadb2aba40252e2869bacbc5757a69d76894c26346d5fc11d0338
-
Filesize
290B
MD52829016e1543e25208f35abfdcd1d194
SHA1e5161f37954516b7890803958b86319e2ad423ed
SHA256b79e1f32da9646465f7235158e73edaaad259fe47e38e2ca0d3122bffe9acff3
SHA512d7031ab1f94e3eb4ff39f8cb630011934f0fb9ca723aad8d5f9ec488d77f1a0cb23ecc3b6e4dadb2aba40252e2869bacbc5757a69d76894c26346d5fc11d0338
-
Filesize
76KB
MD5fcc395a83a66b4bbe334559989404de9
SHA13156b54e9d0e0531aae8b49a986097e375838b8d
SHA256d9be7c9332b454156b6acae0738526520d4314062435c05d51bed30128481077
SHA51297ce3b8e9e7b715e898359e3b10f76da2dc246e03852603c9d4887a518054a6c7bdc44aba8bcbb8899354706f7809e795f92ced6a994dbe67bb89c0bc265ab8b