Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 16:15

General

  • Target

    NEAS.06b2b6b6cf7dcfce6d476fc891b55fb0_JC.exe

  • Size

    267KB

  • MD5

    06b2b6b6cf7dcfce6d476fc891b55fb0

  • SHA1

    c2b3dc78411da5b2ea828de4e1af3e46e398e06c

  • SHA256

    f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

  • SHA512

    a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

  • SSDEEP

    6144:KxZamYMqzuQsioLIksosR0v9eUf0VL0fs3:KlMzuQsf7sJLl

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.06b2b6b6cf7dcfce6d476fc891b55fb0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.06b2b6b6cf7dcfce6d476fc891b55fb0_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\NEAS.06b2b6b6cf7dcfce6d476fc891b55fb0_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.06b2b6b6cf7dcfce6d476fc891b55fb0_JC.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe
        "C:\ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe
          "C:\ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe"
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe
            "C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe" /i:2688
            5⤵
              PID:2492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe

      Filesize

      267KB

      MD5

      06b2b6b6cf7dcfce6d476fc891b55fb0

      SHA1

      c2b3dc78411da5b2ea828de4e1af3e46e398e06c

      SHA256

      f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

      SHA512

      a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

    • C:\ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe

      Filesize

      267KB

      MD5

      06b2b6b6cf7dcfce6d476fc891b55fb0

      SHA1

      c2b3dc78411da5b2ea828de4e1af3e46e398e06c

      SHA256

      f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

      SHA512

      a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

    • C:\ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe

      Filesize

      267KB

      MD5

      06b2b6b6cf7dcfce6d476fc891b55fb0

      SHA1

      c2b3dc78411da5b2ea828de4e1af3e46e398e06c

      SHA256

      f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

      SHA512

      a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

    • C:\ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe

      Filesize

      267KB

      MD5

      06b2b6b6cf7dcfce6d476fc891b55fb0

      SHA1

      c2b3dc78411da5b2ea828de4e1af3e46e398e06c

      SHA256

      f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

      SHA512

      a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

    • \ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe

      Filesize

      267KB

      MD5

      06b2b6b6cf7dcfce6d476fc891b55fb0

      SHA1

      c2b3dc78411da5b2ea828de4e1af3e46e398e06c

      SHA256

      f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

      SHA512

      a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

    • \ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe

      Filesize

      267KB

      MD5

      06b2b6b6cf7dcfce6d476fc891b55fb0

      SHA1

      c2b3dc78411da5b2ea828de4e1af3e46e398e06c

      SHA256

      f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

      SHA512

      a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

    • \ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe

      Filesize

      267KB

      MD5

      06b2b6b6cf7dcfce6d476fc891b55fb0

      SHA1

      c2b3dc78411da5b2ea828de4e1af3e46e398e06c

      SHA256

      f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

      SHA512

      a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

    • \ProgramData\CYrigMwtnJu\7opPyfjcTiqM7ZZt.exe

      Filesize

      267KB

      MD5

      06b2b6b6cf7dcfce6d476fc891b55fb0

      SHA1

      c2b3dc78411da5b2ea828de4e1af3e46e398e06c

      SHA256

      f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

      SHA512

      a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

    • \Users\Admin\AppData\Local\Temp\jrDyr9SWTFGhMnV.exe

      Filesize

      267KB

      MD5

      06b2b6b6cf7dcfce6d476fc891b55fb0

      SHA1

      c2b3dc78411da5b2ea828de4e1af3e46e398e06c

      SHA256

      f8fe03dbe5be4ecc62f2569b927d39b0603df16f35e5c267d419870e4afa75fc

      SHA512

      a81615aa370a95f502ec3d5b146a01e45b2bbde01e0bb6762077494336db22ceac8610f645a243bcd5f296882671696188204d2de065751506fb60ad5506e17e

    • memory/2248-5-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/2300-23-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2300-7-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2300-6-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2300-4-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2300-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2300-8-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2300-0-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2492-51-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2492-54-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2492-46-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2688-37-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2688-43-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2688-52-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2688-42-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2688-41-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3016-34-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB