Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8e58c900964c6c6a987fc284e23b3350.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.8e58c900964c6c6a987fc284e23b3350.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.8e58c900964c6c6a987fc284e23b3350.exe
-
Size
376KB
-
MD5
8e58c900964c6c6a987fc284e23b3350
-
SHA1
11d97983d82fe650b82ff08c7f5130e324509b53
-
SHA256
8ade8ba36fd01edcc2ed33decbe2b277049b20107ed361e4337e6ba117cbe10b
-
SHA512
31657412048dbbea8d5cc80fc28cb9a03a4b974dc32b0680a7a74d66fdca255e68850af377b1e9780728d7338029ad4009568956d1a34a0285569251b50f3551
-
SSDEEP
6144:YVTarW9Q2d06VPAKovnQUvmmAF7J77777S40XB7:YVmrW9HNPGvnQUvmmAF7J77777SnXB7
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2612 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 NEAS.8e58c900964c6c6a987fc284e23b3350.exe 2112 NEAS.8e58c900964c6c6a987fc284e23b3350.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\712f17e5\jusched.exe NEAS.8e58c900964c6c6a987fc284e23b3350.exe File created C:\Program Files (x86)\712f17e5\712f17e5 NEAS.8e58c900964c6c6a987fc284e23b3350.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.8e58c900964c6c6a987fc284e23b3350.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2612 2112 NEAS.8e58c900964c6c6a987fc284e23b3350.exe 28 PID 2112 wrote to memory of 2612 2112 NEAS.8e58c900964c6c6a987fc284e23b3350.exe 28 PID 2112 wrote to memory of 2612 2112 NEAS.8e58c900964c6c6a987fc284e23b3350.exe 28 PID 2112 wrote to memory of 2612 2112 NEAS.8e58c900964c6c6a987fc284e23b3350.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8e58c900964c6c6a987fc284e23b3350.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8e58c900964c6c6a987fc284e23b3350.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\712f17e5\jusched.exe"C:\Program Files (x86)\712f17e5\jusched.exe"2⤵
- Executes dropped EXE
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5209aa6c14d66621f3aa1cee03a8bf5dc
SHA10f5bce2a29d3306586934b6d846a172078ee8e66
SHA25657ef9e3c809cf3ca41782d4c7119c3ae7e43ccbb1c00d978b745677f14b82c2e
SHA5128b9fb2bcc8e8785a48d3fe212f852c2f108ef2ab20e9e2a61e9bba5857002abe9111e42411bfc573e50c126031b7ef0433bddfa357de2ca0814f7d31157b9c63
-
Filesize
377KB
MD58c10902f6f04d249efac990e2e1d5c7b
SHA16d4da55062912c1049c5e14001909516f4ef9034
SHA2564646efbea7f8755dcac9b4ed4b2f3e731db7cd6503903d40f4b68db59568ffc9
SHA51250332b9fbabbfd1df92f368c132a4d30f76bf2e74222859dcc68d8ab57f4362ccdca29c22629aa799247cea2acfca1ae9b2928a05553b0aaf8f121d852f56f29
-
Filesize
377KB
MD58c10902f6f04d249efac990e2e1d5c7b
SHA16d4da55062912c1049c5e14001909516f4ef9034
SHA2564646efbea7f8755dcac9b4ed4b2f3e731db7cd6503903d40f4b68db59568ffc9
SHA51250332b9fbabbfd1df92f368c132a4d30f76bf2e74222859dcc68d8ab57f4362ccdca29c22629aa799247cea2acfca1ae9b2928a05553b0aaf8f121d852f56f29
-
Filesize
377KB
MD58c10902f6f04d249efac990e2e1d5c7b
SHA16d4da55062912c1049c5e14001909516f4ef9034
SHA2564646efbea7f8755dcac9b4ed4b2f3e731db7cd6503903d40f4b68db59568ffc9
SHA51250332b9fbabbfd1df92f368c132a4d30f76bf2e74222859dcc68d8ab57f4362ccdca29c22629aa799247cea2acfca1ae9b2928a05553b0aaf8f121d852f56f29
-
Filesize
377KB
MD58c10902f6f04d249efac990e2e1d5c7b
SHA16d4da55062912c1049c5e14001909516f4ef9034
SHA2564646efbea7f8755dcac9b4ed4b2f3e731db7cd6503903d40f4b68db59568ffc9
SHA51250332b9fbabbfd1df92f368c132a4d30f76bf2e74222859dcc68d8ab57f4362ccdca29c22629aa799247cea2acfca1ae9b2928a05553b0aaf8f121d852f56f29