Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.332ae446493becdc83220dbf38485730.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.332ae446493becdc83220dbf38485730.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.332ae446493becdc83220dbf38485730.exe
-
Size
314KB
-
MD5
332ae446493becdc83220dbf38485730
-
SHA1
705e464c8cf38238208f53aadbc70e36d2e61791
-
SHA256
3ebaa5a55cd6c4284f8d9c6ff501a242c13bc04d1437f5d57486c544ff4d7bdc
-
SHA512
c7949daa6511d8a4eb57898c44aeff8de6935978d7415af262ccb002e087c1545a2ec49ab639fa61a4846bb417fe8e2f3720a34b957f410362865550ccf87b6d
-
SSDEEP
6144:4wnqO4OgaqP/MlH3aN5eDds5A/D8XG2MBuW4a/ViE2lPnT5sc7uVzmCoZbnIfBb5:Dq7dnGqNSR/ygus/gNT6cqhebIpbxdFb
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2532 zlzghad.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zlzghad.exe NEAS.332ae446493becdc83220dbf38485730.exe File created C:\PROGRA~3\Mozilla\unslydf.dll zlzghad.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2532 2756 taskeng.exe 31 PID 2756 wrote to memory of 2532 2756 taskeng.exe 31 PID 2756 wrote to memory of 2532 2756 taskeng.exe 31 PID 2756 wrote to memory of 2532 2756 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.332ae446493becdc83220dbf38485730.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.332ae446493becdc83220dbf38485730.exe"1⤵
- Drops file in Program Files directory
PID:3028
-
C:\Windows\system32\taskeng.exetaskeng.exe {07371B14-2C8A-4132-B978-AC6BB9B6BD7B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\PROGRA~3\Mozilla\zlzghad.exeC:\PROGRA~3\Mozilla\zlzghad.exe -pmcpovi2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD5174c4452b4743615a6e6ca7277d13ea0
SHA1081776229a9be0a195e4e2dd8ccd823d460b7bc7
SHA256c521891ee2b1c7dd4d80e60027023ad91967f795fe7f10a8487e6791a22af194
SHA512280e38f242aeaef565821a3d88fb0664ccc67763861b847bf1887cd4279f4d189728595fb29ec452d75e8e533493f3d005e3a476d4ff125a02a896c2ca4e8fc3
-
Filesize
314KB
MD5174c4452b4743615a6e6ca7277d13ea0
SHA1081776229a9be0a195e4e2dd8ccd823d460b7bc7
SHA256c521891ee2b1c7dd4d80e60027023ad91967f795fe7f10a8487e6791a22af194
SHA512280e38f242aeaef565821a3d88fb0664ccc67763861b847bf1887cd4279f4d189728595fb29ec452d75e8e533493f3d005e3a476d4ff125a02a896c2ca4e8fc3