Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f9970831c7ef7d9a9b544cff6314f220.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f9970831c7ef7d9a9b544cff6314f220.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.f9970831c7ef7d9a9b544cff6314f220.exe
-
Size
282KB
-
MD5
f9970831c7ef7d9a9b544cff6314f220
-
SHA1
cce902bcfe531c43c01dec177cfbb14f39521455
-
SHA256
1383f199f9b09d086a731c9a290909a0419e02fc1e12b4d016cb4109de411ede
-
SHA512
186e3b6757c00caa92c03724b514e832c389e6b6c3ae0ae3194e7d08b02de9278e1576205e4a592ef64c5b6e7a9f6dff308a72f85d0724fdb01b366efbf02120
-
SSDEEP
6144:QtnqqrpY8RapeqHSJyoFkaGoZxkEjiPISUOgW9X+hOGzC/:QtnqqrZQQqHSJyoFkaGoZxkmZzcukG2/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2652 IPTQ.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\IPTQ.exe.bat NEAS.f9970831c7ef7d9a9b544cff6314f220.exe File created C:\windows\IPTQ.exe NEAS.f9970831c7ef7d9a9b544cff6314f220.exe File opened for modification C:\windows\IPTQ.exe NEAS.f9970831c7ef7d9a9b544cff6314f220.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2204 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 2652 IPTQ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2204 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 2204 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 2652 IPTQ.exe 2652 IPTQ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2376 2204 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 28 PID 2204 wrote to memory of 2376 2204 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 28 PID 2204 wrote to memory of 2376 2204 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 28 PID 2204 wrote to memory of 2376 2204 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 28 PID 2376 wrote to memory of 2652 2376 cmd.exe 30 PID 2376 wrote to memory of 2652 2376 cmd.exe 30 PID 2376 wrote to memory of 2652 2376 cmd.exe 30 PID 2376 wrote to memory of 2652 2376 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f9970831c7ef7d9a9b544cff6314f220.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f9970831c7ef7d9a9b544cff6314f220.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\IPTQ.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\windows\IPTQ.exeC:\windows\IPTQ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5cd4ddb6addbe1d82dc0f4f1b8fbe9c01
SHA13313d5cf424aa5ebd44e9a3d7338458dcf7ebc82
SHA256d7a56ea3010b08778a53709d480a7cecf9a2266a97c61d47b350a539114ece8f
SHA512e6627e6ff221309882145c15cf4a2dbeb3dc92002131b809e0d3c578219023b3b6d5dffe4dc4f086c30fbf1a3523036d79e541405f64d75df715bc93c9453b50
-
Filesize
54B
MD599368407fd72ab2da099474194d5a307
SHA159743fea640c88bfe60f157449a1ada9017f052e
SHA256e8af982a7c8ccf5760f9c36c870ecb759e903da8cd794759cca35be2bc623557
SHA512b77cd7337975695fe5cd5b7a8a7a09dd629fc7bf30d358dfab419c02102f17c61e60c7069289dbcf32b64e9b4a8f4594edb8d6e80487cdcdb462132ad95a750e
-
Filesize
282KB
MD5cd4ddb6addbe1d82dc0f4f1b8fbe9c01
SHA13313d5cf424aa5ebd44e9a3d7338458dcf7ebc82
SHA256d7a56ea3010b08778a53709d480a7cecf9a2266a97c61d47b350a539114ece8f
SHA512e6627e6ff221309882145c15cf4a2dbeb3dc92002131b809e0d3c578219023b3b6d5dffe4dc4f086c30fbf1a3523036d79e541405f64d75df715bc93c9453b50
-
Filesize
54B
MD599368407fd72ab2da099474194d5a307
SHA159743fea640c88bfe60f157449a1ada9017f052e
SHA256e8af982a7c8ccf5760f9c36c870ecb759e903da8cd794759cca35be2bc623557
SHA512b77cd7337975695fe5cd5b7a8a7a09dd629fc7bf30d358dfab419c02102f17c61e60c7069289dbcf32b64e9b4a8f4594edb8d6e80487cdcdb462132ad95a750e