Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b0749aae554986bfa0d35f20e2f2f740.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.b0749aae554986bfa0d35f20e2f2f740.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.b0749aae554986bfa0d35f20e2f2f740.exe
-
Size
200KB
-
MD5
b0749aae554986bfa0d35f20e2f2f740
-
SHA1
80fe356b51fdd237ddf856ca897fa9e38286d97a
-
SHA256
384fe222a93548118e8b3173247f69fabcd028e54f6f16a7ee61ae1e89edf38d
-
SHA512
3d968f553605edc7476c99bd179ef5ae3969471298e848ee064a5fd6f2ef0688805facf078a4c1dc51628a9c5f1f0b3422baf352f389eab802f80cd029a70097
-
SSDEEP
768:J/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfL/:JRsvcdcQjosnvnZ6LQ1E/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2876 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2344 NEAS.b0749aae554986bfa0d35f20e2f2f740.exe 2344 NEAS.b0749aae554986bfa0d35f20e2f2f740.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\UF NEAS.b0749aae554986bfa0d35f20e2f2f740.exe File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.b0749aae554986bfa0d35f20e2f2f740.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.b0749aae554986bfa0d35f20e2f2f740.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe 2876 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2876 2344 NEAS.b0749aae554986bfa0d35f20e2f2f740.exe 28 PID 2344 wrote to memory of 2876 2344 NEAS.b0749aae554986bfa0d35f20e2f2f740.exe 28 PID 2344 wrote to memory of 2876 2344 NEAS.b0749aae554986bfa0d35f20e2f2f740.exe 28 PID 2344 wrote to memory of 2876 2344 NEAS.b0749aae554986bfa0d35f20e2f2f740.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b0749aae554986bfa0d35f20e2f2f740.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b0749aae554986bfa0d35f20e2f2f740.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5c73746a43aeb8870f794dd8c62ee55b2
SHA12c8d27ab0ee7e4e5491e992195b47de2295ffcae
SHA256539beaeaf03ed308a59473cd7408d1d0ce06091d0719eef17ab792dd9b1ef1a9
SHA5121494f68c6960d77270a86f09487564abe9c7a90d258c18b72a6901f5662da94f91c5b1c64b24ff85ae18816e68065239fb256ed1043cde5724036524d657458c
-
Filesize
200KB
MD5c73746a43aeb8870f794dd8c62ee55b2
SHA12c8d27ab0ee7e4e5491e992195b47de2295ffcae
SHA256539beaeaf03ed308a59473cd7408d1d0ce06091d0719eef17ab792dd9b1ef1a9
SHA5121494f68c6960d77270a86f09487564abe9c7a90d258c18b72a6901f5662da94f91c5b1c64b24ff85ae18816e68065239fb256ed1043cde5724036524d657458c
-
Filesize
200KB
MD5c73746a43aeb8870f794dd8c62ee55b2
SHA12c8d27ab0ee7e4e5491e992195b47de2295ffcae
SHA256539beaeaf03ed308a59473cd7408d1d0ce06091d0719eef17ab792dd9b1ef1a9
SHA5121494f68c6960d77270a86f09487564abe9c7a90d258c18b72a6901f5662da94f91c5b1c64b24ff85ae18816e68065239fb256ed1043cde5724036524d657458c
-
Filesize
200KB
MD5c73746a43aeb8870f794dd8c62ee55b2
SHA12c8d27ab0ee7e4e5491e992195b47de2295ffcae
SHA256539beaeaf03ed308a59473cd7408d1d0ce06091d0719eef17ab792dd9b1ef1a9
SHA5121494f68c6960d77270a86f09487564abe9c7a90d258c18b72a6901f5662da94f91c5b1c64b24ff85ae18816e68065239fb256ed1043cde5724036524d657458c
-
Filesize
200KB
MD5c73746a43aeb8870f794dd8c62ee55b2
SHA12c8d27ab0ee7e4e5491e992195b47de2295ffcae
SHA256539beaeaf03ed308a59473cd7408d1d0ce06091d0719eef17ab792dd9b1ef1a9
SHA5121494f68c6960d77270a86f09487564abe9c7a90d258c18b72a6901f5662da94f91c5b1c64b24ff85ae18816e68065239fb256ed1043cde5724036524d657458c