Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe
-
Size
340KB
-
MD5
0b2ca15b3f0c2af1ee646d50f9917d20
-
SHA1
839b2b3b09f5947fe6818e925feeb0af97d3f603
-
SHA256
dfa83e0a985772156d60061f77cebcf1d7e6569c57704ba567cb7eb9e1fee802
-
SHA512
2bc66352a39c2edd4bcf005d565368975e6e92195a16a8ae23b2a37e8f74d6792e78d4a473263670017c912cc6ae3614b7e49f28c210d56b412d73a7afea18eb
-
SSDEEP
6144:ztvBPnU1b7e9SQii1EkoNlhlrQ2ZrM2xsyxr8ceQdWTw:Zv1nWdQP1EDhZPxsyFDdWTw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2708 Isass.exe 2736 LD_NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe -
Loads dropped DLL 4 IoCs
pid Process 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 2672 Process not Found -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 2708 Isass.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2708 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 28 PID 2124 wrote to memory of 2708 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 28 PID 2124 wrote to memory of 2708 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 28 PID 2124 wrote to memory of 2708 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 28 PID 2124 wrote to memory of 2736 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 29 PID 2124 wrote to memory of 2736 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 29 PID 2124 wrote to memory of 2736 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 29 PID 2124 wrote to memory of 2736 2124 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\LD_NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe"C:\Users\Admin\AppData\Local\Temp\LD_NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe"2⤵
- Executes dropped EXE
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD532766791428d36d8752c892633c1ddc4
SHA101d489f3ffdd82b1d3a33d0d4dc5d5bd076ac930
SHA25654fe80d5413a4c94c8063b768715fbaee9555cb1c19f7bf1af22689b20ffbb35
SHA5125e15a2714afdd1f9c2fc1112d973d98e5044d9d96e805b4b7844d8d07637b924cf7f7c350a7f740671f011f6242b4dc1d745bce06ade13a7f02e223c1de7f823
-
Filesize
213KB
MD532766791428d36d8752c892633c1ddc4
SHA101d489f3ffdd82b1d3a33d0d4dc5d5bd076ac930
SHA25654fe80d5413a4c94c8063b768715fbaee9555cb1c19f7bf1af22689b20ffbb35
SHA5125e15a2714afdd1f9c2fc1112d973d98e5044d9d96e805b4b7844d8d07637b924cf7f7c350a7f740671f011f6242b4dc1d745bce06ade13a7f02e223c1de7f823
-
Filesize
213KB
MD532766791428d36d8752c892633c1ddc4
SHA101d489f3ffdd82b1d3a33d0d4dc5d5bd076ac930
SHA25654fe80d5413a4c94c8063b768715fbaee9555cb1c19f7bf1af22689b20ffbb35
SHA5125e15a2714afdd1f9c2fc1112d973d98e5044d9d96e805b4b7844d8d07637b924cf7f7c350a7f740671f011f6242b4dc1d745bce06ade13a7f02e223c1de7f823
-
Filesize
99KB
MD5add15a53fd06b29b67959d7a527b16b7
SHA1a93b3d6d129e3f99e32b6c2ea6a96e896c090b1a
SHA256786e68ded8af18f36274d78ea00ff11289c27107dd9f8fdd2f6b4732a3b8a2da
SHA512ff7b4461448820a8a7f09f5b0282dd4fd042050072719838ab72dc6f8aac9e25982b568dbb2ba9877db2b66018bda46043fd98ef123c07af446b1fb161be2430
-
Filesize
213KB
MD532766791428d36d8752c892633c1ddc4
SHA101d489f3ffdd82b1d3a33d0d4dc5d5bd076ac930
SHA25654fe80d5413a4c94c8063b768715fbaee9555cb1c19f7bf1af22689b20ffbb35
SHA5125e15a2714afdd1f9c2fc1112d973d98e5044d9d96e805b4b7844d8d07637b924cf7f7c350a7f740671f011f6242b4dc1d745bce06ade13a7f02e223c1de7f823
-
Filesize
213KB
MD532766791428d36d8752c892633c1ddc4
SHA101d489f3ffdd82b1d3a33d0d4dc5d5bd076ac930
SHA25654fe80d5413a4c94c8063b768715fbaee9555cb1c19f7bf1af22689b20ffbb35
SHA5125e15a2714afdd1f9c2fc1112d973d98e5044d9d96e805b4b7844d8d07637b924cf7f7c350a7f740671f011f6242b4dc1d745bce06ade13a7f02e223c1de7f823
-
Filesize
99KB
MD5add15a53fd06b29b67959d7a527b16b7
SHA1a93b3d6d129e3f99e32b6c2ea6a96e896c090b1a
SHA256786e68ded8af18f36274d78ea00ff11289c27107dd9f8fdd2f6b4732a3b8a2da
SHA512ff7b4461448820a8a7f09f5b0282dd4fd042050072719838ab72dc6f8aac9e25982b568dbb2ba9877db2b66018bda46043fd98ef123c07af446b1fb161be2430
-
Filesize
99KB
MD5add15a53fd06b29b67959d7a527b16b7
SHA1a93b3d6d129e3f99e32b6c2ea6a96e896c090b1a
SHA256786e68ded8af18f36274d78ea00ff11289c27107dd9f8fdd2f6b4732a3b8a2da
SHA512ff7b4461448820a8a7f09f5b0282dd4fd042050072719838ab72dc6f8aac9e25982b568dbb2ba9877db2b66018bda46043fd98ef123c07af446b1fb161be2430