Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe
-
Size
200KB
-
MD5
124be3760c8a6a2f8ac4824fb5fa58e0
-
SHA1
0e3c4abadacc0a771f65992cb26d9b58c092eeda
-
SHA256
d2ee5f795a6bb8a3ce37c54780d37429b69912633f6fbd3cd27df273718745bd
-
SHA512
c911d204eeda2ab3a6c1858127fc194388e00c340f47963e2434a3454a02578a1fadcfda69e2d368c0fb6dca64768897450cc6cf7f5f87704c8efea300d21a1a
-
SSDEEP
6144:ld+hja/s1oWJ0uezK4WmlYW9IArXG1B7u:l0BesCWJYKTDjALG1BC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 860 NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 860 NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe -
Loads dropped DLL 1 IoCs
pid Process 2012 NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2012 NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 860 NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 860 2012 NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe 29 PID 2012 wrote to memory of 860 2012 NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe 29 PID 2012 wrote to memory of 860 2012 NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe 29 PID 2012 wrote to memory of 860 2012 NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exeC:\Users\Admin\AppData\Local\Temp\NEAS.124be3760c8a6a2f8ac4824fb5fa58e0_JC.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD521647a4d5dab773de5b7f9132c4f335c
SHA1c9c7a522585f48a6f5914c8851384b1a2719f84e
SHA256cdc14267380ca8144bc34b3e67b1c4ffc075bcd9d4c37de37af184729dc2ee3b
SHA512031afee9c542dec00852f26127b37f91ea92e5c7048d1a0e23084d0de35d6e8a4aa4b05166c80212b7959c82073d27b6c9143c65e6e3ee194dadc1ba38a06f71
-
Filesize
200KB
MD521647a4d5dab773de5b7f9132c4f335c
SHA1c9c7a522585f48a6f5914c8851384b1a2719f84e
SHA256cdc14267380ca8144bc34b3e67b1c4ffc075bcd9d4c37de37af184729dc2ee3b
SHA512031afee9c542dec00852f26127b37f91ea92e5c7048d1a0e23084d0de35d6e8a4aa4b05166c80212b7959c82073d27b6c9143c65e6e3ee194dadc1ba38a06f71