Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 08:19 UTC
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe
-
Size
932KB
-
MD5
e0dbd21ca72a28b1447b1e49110b2160
-
SHA1
93cdb50beab354560a034f979b4d069da07e14f8
-
SHA256
b9db76350af25816d2fd2f3a43de3d22f43ee82684a78dbef3e4f90259b88fab
-
SHA512
8b3cae7c523a11b67c7ee9e151d47c7b9b4602240c89d694f7a82922d9ee14ebfe7bc307dc6e684006f8f48b62a273c8c082c11ad478ebbf4f08ecaf4431ca08
-
SSDEEP
24576:P1/aGLDCM4D8ayGMZo8/Kf6EGdlvZ2eZCGy5csehLPayhqbLXyaXv+R:gD8ayGMZoTf6EGdlvZ2AJy5c3LPacqbg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3056 eveyij.exe -
Loads dropped DLL 2 IoCs
pid Process 812 NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe 812 NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\eveyij.exe" eveyij.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 812 wrote to memory of 3056 812 NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe 28 PID 812 wrote to memory of 3056 812 NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe 28 PID 812 wrote to memory of 3056 812 NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe 28 PID 812 wrote to memory of 3056 812 NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:812 -
C:\ProgramData\eveyij.exe"C:\ProgramData\eveyij.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD56a020317d863c5abe46e4b86ab8e579d
SHA19e7c773010d682a9077a7c47fe62aa2ff4601cac
SHA256bd6f1e38f455bf27c80b5c605b68e25cca21a9834f8126b76796c61d70ff50f8
SHA5126d263cdcf142abd713950d4e99aa0bc8a1296d42e13f49cc6c78901de06c44d9abe6fc0818227ef8710d0c881a216a28054da35c318a7b445422856b432afb41
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
454KB
MD547df574859f63a374bd53d5547df2829
SHA11b07df9f450870d5215844d661d0281853bb7dc5
SHA2560adb3e09c8eb7caa537fd16d01083f6a7843969033a4719fe27376767b8a8c68
SHA51283248c557a4bf5d8484decae5a28f693e48863974cfecf5f389a96f76a7f095c96680fc50a01e3c3d4a19834e821d446941d88591be367fe17ac6d4e7a1b33fa
-
Filesize
454KB
MD547df574859f63a374bd53d5547df2829
SHA11b07df9f450870d5215844d661d0281853bb7dc5
SHA2560adb3e09c8eb7caa537fd16d01083f6a7843969033a4719fe27376767b8a8c68
SHA51283248c557a4bf5d8484decae5a28f693e48863974cfecf5f389a96f76a7f095c96680fc50a01e3c3d4a19834e821d446941d88591be367fe17ac6d4e7a1b33fa
-
Filesize
454KB
MD547df574859f63a374bd53d5547df2829
SHA11b07df9f450870d5215844d661d0281853bb7dc5
SHA2560adb3e09c8eb7caa537fd16d01083f6a7843969033a4719fe27376767b8a8c68
SHA51283248c557a4bf5d8484decae5a28f693e48863974cfecf5f389a96f76a7f095c96680fc50a01e3c3d4a19834e821d446941d88591be367fe17ac6d4e7a1b33fa
-
Filesize
454KB
MD547df574859f63a374bd53d5547df2829
SHA11b07df9f450870d5215844d661d0281853bb7dc5
SHA2560adb3e09c8eb7caa537fd16d01083f6a7843969033a4719fe27376767b8a8c68
SHA51283248c557a4bf5d8484decae5a28f693e48863974cfecf5f389a96f76a7f095c96680fc50a01e3c3d4a19834e821d446941d88591be367fe17ac6d4e7a1b33fa
-
Filesize
454KB
MD547df574859f63a374bd53d5547df2829
SHA11b07df9f450870d5215844d661d0281853bb7dc5
SHA2560adb3e09c8eb7caa537fd16d01083f6a7843969033a4719fe27376767b8a8c68
SHA51283248c557a4bf5d8484decae5a28f693e48863974cfecf5f389a96f76a7f095c96680fc50a01e3c3d4a19834e821d446941d88591be367fe17ac6d4e7a1b33fa