Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4298879a258591451825ccdc4f5415c0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4298879a258591451825ccdc4f5415c0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4298879a258591451825ccdc4f5415c0.exe
-
Size
208KB
-
MD5
4298879a258591451825ccdc4f5415c0
-
SHA1
ebc56c2e24db24fdaff4e71d428781f2180f4a87
-
SHA256
0fcbe192138b8701b5ef78ffe6f8f1acbfadef3f09f65bfebc4009bd947e3c13
-
SHA512
3ced5d9077600eb5d9374dfd4a4b715144c01776f9c0af607ff5b795fdbe9e7b7a8dcc973f9251e8b075e5d13a816df2d67896d36d7516a97a3d5a9355e7eb99
-
SSDEEP
3072:7cxf+PFBDQsgEbbrYuNbUI0hbgt+Xu9zc4NLthEjQT6j:rBDQ9EbgUvM11QEj1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2060 HVU.exe -
Loads dropped DLL 2 IoCs
pid Process 3004 cmd.exe 3004 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\windows\system\HVU.exe NEAS.4298879a258591451825ccdc4f5415c0.exe File created C:\windows\system\HVU.exe.bat NEAS.4298879a258591451825ccdc4f5415c0.exe File created C:\windows\system\HVU.exe NEAS.4298879a258591451825ccdc4f5415c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2468 NEAS.4298879a258591451825ccdc4f5415c0.exe 2060 HVU.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2468 NEAS.4298879a258591451825ccdc4f5415c0.exe 2468 NEAS.4298879a258591451825ccdc4f5415c0.exe 2060 HVU.exe 2060 HVU.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2468 wrote to memory of 3004 2468 NEAS.4298879a258591451825ccdc4f5415c0.exe 28 PID 2468 wrote to memory of 3004 2468 NEAS.4298879a258591451825ccdc4f5415c0.exe 28 PID 2468 wrote to memory of 3004 2468 NEAS.4298879a258591451825ccdc4f5415c0.exe 28 PID 2468 wrote to memory of 3004 2468 NEAS.4298879a258591451825ccdc4f5415c0.exe 28 PID 3004 wrote to memory of 2060 3004 cmd.exe 30 PID 3004 wrote to memory of 2060 3004 cmd.exe 30 PID 3004 wrote to memory of 2060 3004 cmd.exe 30 PID 3004 wrote to memory of 2060 3004 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4298879a258591451825ccdc4f5415c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4298879a258591451825ccdc4f5415c0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system\HVU.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\windows\system\HVU.exeC:\windows\system\HVU.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD558b53ad96a68ced6ed3801568b858e47
SHA122cca08ab0d630dfc563ad96d24159bcd3077590
SHA256cfedbd3caff0f9284f89f6f70c3a2fda8ecbc4f3e2e87218875a4c07964cd7b3
SHA512702ae1c4ece3199c9c5b7ca13d3ff0ebdd217c4890f911e63a469536a7cb2eb7f1f5930a975993a2b7f62c04bac6f27c00c66f849974a810875a4b2cdae5cc57
-
Filesize
66B
MD5ce1c785faedf329de5bb7c182eeabc8e
SHA1e49a365c3c8997a5a7f378cb55c69685ced24295
SHA2569d00e53164ae15343dde2bd0a55b557aec03d3fa443ae206ad5e7467b9194dbe
SHA512e4c3a7a3e1e9637c1d50ddb73679f6e4fa1c63718c121893a0b3c8550384d0885d2dcb271c659a93447fcf80fbc1535dc978a1acbfb51754a4bb810b92a7c75d
-
Filesize
208KB
MD558b53ad96a68ced6ed3801568b858e47
SHA122cca08ab0d630dfc563ad96d24159bcd3077590
SHA256cfedbd3caff0f9284f89f6f70c3a2fda8ecbc4f3e2e87218875a4c07964cd7b3
SHA512702ae1c4ece3199c9c5b7ca13d3ff0ebdd217c4890f911e63a469536a7cb2eb7f1f5930a975993a2b7f62c04bac6f27c00c66f849974a810875a4b2cdae5cc57
-
Filesize
66B
MD5ce1c785faedf329de5bb7c182eeabc8e
SHA1e49a365c3c8997a5a7f378cb55c69685ced24295
SHA2569d00e53164ae15343dde2bd0a55b557aec03d3fa443ae206ad5e7467b9194dbe
SHA512e4c3a7a3e1e9637c1d50ddb73679f6e4fa1c63718c121893a0b3c8550384d0885d2dcb271c659a93447fcf80fbc1535dc978a1acbfb51754a4bb810b92a7c75d
-
Filesize
208KB
MD558b53ad96a68ced6ed3801568b858e47
SHA122cca08ab0d630dfc563ad96d24159bcd3077590
SHA256cfedbd3caff0f9284f89f6f70c3a2fda8ecbc4f3e2e87218875a4c07964cd7b3
SHA512702ae1c4ece3199c9c5b7ca13d3ff0ebdd217c4890f911e63a469536a7cb2eb7f1f5930a975993a2b7f62c04bac6f27c00c66f849974a810875a4b2cdae5cc57
-
Filesize
208KB
MD558b53ad96a68ced6ed3801568b858e47
SHA122cca08ab0d630dfc563ad96d24159bcd3077590
SHA256cfedbd3caff0f9284f89f6f70c3a2fda8ecbc4f3e2e87218875a4c07964cd7b3
SHA512702ae1c4ece3199c9c5b7ca13d3ff0ebdd217c4890f911e63a469536a7cb2eb7f1f5930a975993a2b7f62c04bac6f27c00c66f849974a810875a4b2cdae5cc57