Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 19:45

General

  • Target

    NEAS.1767147d72b8c12b519ff1724bc2e360.exe

  • Size

    145KB

  • MD5

    1767147d72b8c12b519ff1724bc2e360

  • SHA1

    acad5b828c600e18391f4a91b0de912bc984e5bc

  • SHA256

    865308734dd7fc421d36920ff79ce0ae4efcd214580a0ea42520751d451d7e5a

  • SHA512

    e204ee1da2dae925d3921575e2c9fc7fb6e6f35cf438fc40d4756a90c184ffaadad520e89115be236da1f8f885536d38152f41dfa6865b5ff287fc6d4384110d

  • SSDEEP

    3072:BO8tGaQ3xPEidEJQSqxBZJoYIXp0Tr14bAHK3cd/lazRd:BO8AaqcsEJQSqheYIX2J4a8cdta7

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1767147d72b8c12b519ff1724bc2e360.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1767147d72b8c12b519ff1724bc2e360.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2972
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7C04BB12-A25E-4063-B8A6-533EBC0FDBEC} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\PROGRA~3\Mozilla\jezwark.exe
      C:\PROGRA~3\Mozilla\jezwark.exe -yvxgvyl
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\jezwark.exe

    Filesize

    145KB

    MD5

    bdbb4f47d29f4d48739d05d1e466ce13

    SHA1

    6e78489effaf2631d173588ea80f96f579fc5491

    SHA256

    64727ddc07d1406bbf3b7b42b9888b74fb7f110f7406aeabfe26eb175b72f5e4

    SHA512

    954e9e3b3419c9208b72a739bd01e323ec38d1903c25f9d350303d32135fcd70f759404d2531cf78d2543741a93cf21bce1faf8060f747614052a2eea86d8144

  • C:\PROGRA~3\Mozilla\jezwark.exe

    Filesize

    145KB

    MD5

    bdbb4f47d29f4d48739d05d1e466ce13

    SHA1

    6e78489effaf2631d173588ea80f96f579fc5491

    SHA256

    64727ddc07d1406bbf3b7b42b9888b74fb7f110f7406aeabfe26eb175b72f5e4

    SHA512

    954e9e3b3419c9208b72a739bd01e323ec38d1903c25f9d350303d32135fcd70f759404d2531cf78d2543741a93cf21bce1faf8060f747614052a2eea86d8144

  • memory/2260-11-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2260-16-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2972-1-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2972-2-0x0000000000220000-0x0000000000222000-memory.dmp

    Filesize

    8KB

  • memory/2972-3-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2972-7-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB