Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:24
Behavioral task
behavioral1
Sample
NEAS.59ab1f5632b601b7d1c39d7375105000.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.59ab1f5632b601b7d1c39d7375105000.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.59ab1f5632b601b7d1c39d7375105000.exe
-
Size
102KB
-
MD5
59ab1f5632b601b7d1c39d7375105000
-
SHA1
116a3f037763f5df37ffffb142cb5537a605c9a3
-
SHA256
32d470ad24d7be8cdc34c406ba9aa9ab869a71c5a6cfbc15cd66e7696b769adf
-
SHA512
d8f20cc52a15a1893bcf86949a3eb731f7731159e6b9eda5714a40143de2b482a110a2955dc668ae829e2b5babaa422e1364d6931ac082c90b39a45b69bb6b94
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksb:1nK6a+qdOOtEvwDpjb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1632 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2596 NEAS.59ab1f5632b601b7d1c39d7375105000.exe -
resource yara_rule behavioral1/memory/2596-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000a000000012022-11.dat upx behavioral1/memory/2596-15-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000a000000012022-16.dat upx behavioral1/memory/1632-17-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2596-13-0x0000000001FA0000-0x0000000001FB0000-memory.dmp upx behavioral1/files/0x000a000000012022-26.dat upx behavioral1/memory/1632-27-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1632 2596 NEAS.59ab1f5632b601b7d1c39d7375105000.exe 27 PID 2596 wrote to memory of 1632 2596 NEAS.59ab1f5632b601b7d1c39d7375105000.exe 27 PID 2596 wrote to memory of 1632 2596 NEAS.59ab1f5632b601b7d1c39d7375105000.exe 27 PID 2596 wrote to memory of 1632 2596 NEAS.59ab1f5632b601b7d1c39d7375105000.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.59ab1f5632b601b7d1c39d7375105000.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.59ab1f5632b601b7d1c39d7375105000.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5e881add3463319b03e4b49c2843693a3
SHA12dc181c67b2c234455b5e07956f9c95a049b3796
SHA256b32ead38dd5f8422f073a7700b4aedb93b707fdd140f4fdb992588b5e9c77954
SHA512aaecc6ecc28763c2729f78575685bf5e62f0eef2a633eab3e7891140596fe1b306fa4436d176c65b4539144eaa4b8eb2b36c2d3f9097ecc4ad365ab9f4886cee
-
Filesize
102KB
MD5e881add3463319b03e4b49c2843693a3
SHA12dc181c67b2c234455b5e07956f9c95a049b3796
SHA256b32ead38dd5f8422f073a7700b4aedb93b707fdd140f4fdb992588b5e9c77954
SHA512aaecc6ecc28763c2729f78575685bf5e62f0eef2a633eab3e7891140596fe1b306fa4436d176c65b4539144eaa4b8eb2b36c2d3f9097ecc4ad365ab9f4886cee
-
Filesize
102KB
MD5e881add3463319b03e4b49c2843693a3
SHA12dc181c67b2c234455b5e07956f9c95a049b3796
SHA256b32ead38dd5f8422f073a7700b4aedb93b707fdd140f4fdb992588b5e9c77954
SHA512aaecc6ecc28763c2729f78575685bf5e62f0eef2a633eab3e7891140596fe1b306fa4436d176c65b4539144eaa4b8eb2b36c2d3f9097ecc4ad365ab9f4886cee