Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe
Resource
win7-20230831-en
General
-
Target
NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe
-
Size
331KB
-
MD5
8fbfc597ee04d6b9472abe360d5827f0
-
SHA1
eda2059dbd659cba40089d552a031737e25b1408
-
SHA256
2cd4a2228255be8ca927503ca7cb65eaef592eba2738742e889291dfde872d62
-
SHA512
b84ea699d581e610457edf746e82da2557726466d5721ee1fe99fff5114c0aec6fb05541cd86552b5a3f9cdb9da295db8552fa0f435d7f788f7aad90f93e6850
-
SSDEEP
6144:GLtOexihqv4m+lXD6betiTuBMTWjIDIiUBAkW9UOKMOtzWO8CatspdZ:GL1D+IatauBML42MykRak
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 2600 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1576 guefu.exe 2644 joxihi.exe 524 efkot.exe -
Loads dropped DLL 3 IoCs
pid Process 1376 NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe 1576 guefu.exe 2644 joxihi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe 524 efkot.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1576 1376 NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe 28 PID 1376 wrote to memory of 1576 1376 NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe 28 PID 1376 wrote to memory of 1576 1376 NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe 28 PID 1376 wrote to memory of 1576 1376 NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe 28 PID 1376 wrote to memory of 2600 1376 NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe 29 PID 1376 wrote to memory of 2600 1376 NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe 29 PID 1376 wrote to memory of 2600 1376 NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe 29 PID 1376 wrote to memory of 2600 1376 NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe 29 PID 1576 wrote to memory of 2644 1576 guefu.exe 31 PID 1576 wrote to memory of 2644 1576 guefu.exe 31 PID 1576 wrote to memory of 2644 1576 guefu.exe 31 PID 1576 wrote to memory of 2644 1576 guefu.exe 31 PID 2644 wrote to memory of 524 2644 joxihi.exe 34 PID 2644 wrote to memory of 524 2644 joxihi.exe 34 PID 2644 wrote to memory of 524 2644 joxihi.exe 34 PID 2644 wrote to memory of 524 2644 joxihi.exe 34 PID 2644 wrote to memory of 572 2644 joxihi.exe 35 PID 2644 wrote to memory of 572 2644 joxihi.exe 35 PID 2644 wrote to memory of 572 2644 joxihi.exe 35 PID 2644 wrote to memory of 572 2644 joxihi.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8fbfc597ee04d6b9472abe360d5827f0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\guefu.exe"C:\Users\Admin\AppData\Local\Temp\guefu.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\joxihi.exe"C:\Users\Admin\AppData\Local\Temp\joxihi.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\efkot.exe"C:\Users\Admin\AppData\Local\Temp\efkot.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:524
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:572
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD54ce20686fa916c05930d6f695f969da1
SHA19ff6948308c27db6d8f43e9c92d7e5d4cf320ac6
SHA256afb25f3968695fa0deb0c5223dd104f7220b794c07846c4aeddae4afb54f7fd5
SHA51255ca75e7c0258b58aab31ee30bfd91056203dedf01088f243b926990096c571d1f13656ec51d528c9031dab630dee14ee3b2ed3915e5438b4cc5fd6a5ece9a48
-
Filesize
224B
MD54ce20686fa916c05930d6f695f969da1
SHA19ff6948308c27db6d8f43e9c92d7e5d4cf320ac6
SHA256afb25f3968695fa0deb0c5223dd104f7220b794c07846c4aeddae4afb54f7fd5
SHA51255ca75e7c0258b58aab31ee30bfd91056203dedf01088f243b926990096c571d1f13656ec51d528c9031dab630dee14ee3b2ed3915e5438b4cc5fd6a5ece9a48
-
Filesize
286B
MD5448f457f897a2f9e1d5de34c36d99b15
SHA169e1cbca2104f95c68aaa776400554af4815982f
SHA256d8cb895dc81c3ab0235a942df6af7eb9fa2a378ebb616a42e9a090ee0b6eb232
SHA512786ad7fa9ae972c76129a63383d34ba5f1cf6fb32481a397edf2bb9424d4f0e4b85b99a9be82475de66b7bd2f9b59e085aae8d2b0dd461620ba3984eb0721b51
-
Filesize
286B
MD5448f457f897a2f9e1d5de34c36d99b15
SHA169e1cbca2104f95c68aaa776400554af4815982f
SHA256d8cb895dc81c3ab0235a942df6af7eb9fa2a378ebb616a42e9a090ee0b6eb232
SHA512786ad7fa9ae972c76129a63383d34ba5f1cf6fb32481a397edf2bb9424d4f0e4b85b99a9be82475de66b7bd2f9b59e085aae8d2b0dd461620ba3984eb0721b51
-
Filesize
223KB
MD5d3185c2d6e6e57e1a8922349bc6ffd51
SHA18cf600939cf82fdc88a9d687b9e699b5f553cf36
SHA25661989b483718c7c80011bc0e77afce077ddb685580a900d2afae65dad7bc3151
SHA512a681af02edea521c9533a40bdd12074d977f82ba89471ed4735b9de7ebce344fc1c16739c367b74b7f659b7b0bcf36b553e9f32266dbc4811b13735c7bf1a45c
-
Filesize
512B
MD5872aba10d9f4664604f01c80beba5c4a
SHA18961d05a1d37c0c1f2daaa8a421e4a5be7037c50
SHA256255fb94ebdaca9184a4965af4e6308f7914cf860c4311bd2bdea2affb664a0c3
SHA5120fd13054df809a89d2d9bb3ec48df8bd7c33ef60f47f4861dbb41c694f97eebb4ab7cd76fa9c1847dc02047922fd325eda8cccbf4e4e6675972170e78267eeba
-
Filesize
331KB
MD50bb68f7aae077929b1d686a5bf4bde02
SHA1fe7c135d51b74e5ebae212cca265a99024c8a31d
SHA256edfc07d129166005ca70a97542214f4ab7e3c7f8bc8cd749f74b5eeef1b3d80b
SHA512ab6ac8a8845595b060c76463610d2d9f8730ba6afc389a8af1279918354a4ff533c6c22f1e88613daeb4cf944c7258fa08d43d1b7576c2a9e8e6f6a1f9772191
-
Filesize
331KB
MD50bb68f7aae077929b1d686a5bf4bde02
SHA1fe7c135d51b74e5ebae212cca265a99024c8a31d
SHA256edfc07d129166005ca70a97542214f4ab7e3c7f8bc8cd749f74b5eeef1b3d80b
SHA512ab6ac8a8845595b060c76463610d2d9f8730ba6afc389a8af1279918354a4ff533c6c22f1e88613daeb4cf944c7258fa08d43d1b7576c2a9e8e6f6a1f9772191
-
Filesize
331KB
MD5e737ca0cef5d6fb315ea53b8afd71f2b
SHA1e9277919e55cc1c0c1a227bd781d4ca57f7fd161
SHA256bf78d87dc5ab7eafcb25840f63069bcac21da2d61103ace291191b5efbc308ba
SHA51271cc75300fad8acae6c70f68adef3d2c530e4e0248b362dc24877805145f06043fbe44da24834dfa7ee7db86f50e4b6853a68ee4c45aef816ecc72d2195f03d2
-
Filesize
331KB
MD5e737ca0cef5d6fb315ea53b8afd71f2b
SHA1e9277919e55cc1c0c1a227bd781d4ca57f7fd161
SHA256bf78d87dc5ab7eafcb25840f63069bcac21da2d61103ace291191b5efbc308ba
SHA51271cc75300fad8acae6c70f68adef3d2c530e4e0248b362dc24877805145f06043fbe44da24834dfa7ee7db86f50e4b6853a68ee4c45aef816ecc72d2195f03d2
-
Filesize
331KB
MD5e737ca0cef5d6fb315ea53b8afd71f2b
SHA1e9277919e55cc1c0c1a227bd781d4ca57f7fd161
SHA256bf78d87dc5ab7eafcb25840f63069bcac21da2d61103ace291191b5efbc308ba
SHA51271cc75300fad8acae6c70f68adef3d2c530e4e0248b362dc24877805145f06043fbe44da24834dfa7ee7db86f50e4b6853a68ee4c45aef816ecc72d2195f03d2
-
Filesize
223KB
MD5d3185c2d6e6e57e1a8922349bc6ffd51
SHA18cf600939cf82fdc88a9d687b9e699b5f553cf36
SHA25661989b483718c7c80011bc0e77afce077ddb685580a900d2afae65dad7bc3151
SHA512a681af02edea521c9533a40bdd12074d977f82ba89471ed4735b9de7ebce344fc1c16739c367b74b7f659b7b0bcf36b553e9f32266dbc4811b13735c7bf1a45c
-
Filesize
331KB
MD50bb68f7aae077929b1d686a5bf4bde02
SHA1fe7c135d51b74e5ebae212cca265a99024c8a31d
SHA256edfc07d129166005ca70a97542214f4ab7e3c7f8bc8cd749f74b5eeef1b3d80b
SHA512ab6ac8a8845595b060c76463610d2d9f8730ba6afc389a8af1279918354a4ff533c6c22f1e88613daeb4cf944c7258fa08d43d1b7576c2a9e8e6f6a1f9772191
-
Filesize
331KB
MD5e737ca0cef5d6fb315ea53b8afd71f2b
SHA1e9277919e55cc1c0c1a227bd781d4ca57f7fd161
SHA256bf78d87dc5ab7eafcb25840f63069bcac21da2d61103ace291191b5efbc308ba
SHA51271cc75300fad8acae6c70f68adef3d2c530e4e0248b362dc24877805145f06043fbe44da24834dfa7ee7db86f50e4b6853a68ee4c45aef816ecc72d2195f03d2