Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe
-
Size
60KB
-
MD5
a782b1a3c2a2c28ade8854c988ebd320
-
SHA1
0bb4261cfb712c8cabb8c6be1b67ab87ee1e4f42
-
SHA256
c8797f165cc6cb443ba45c6a0fc4fde9eba6f9bb5e141bb8632334ca98d50d4c
-
SHA512
e47fc4eede10d6d785a90bd1a287f77299c17bf48c95451a96c58da4990ffe09e58d9fbc3669ce3cc6c81cbd74e21282a125c488c62731f59a50bb111b479747
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzp0oj670z:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2176 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe 2176 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2176 2204 NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe 28 PID 2204 wrote to memory of 2176 2204 NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe 28 PID 2204 wrote to memory of 2176 2204 NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe 28 PID 2204 wrote to memory of 2176 2204 NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a782b1a3c2a2c28ade8854c988ebd320.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5260d3107d0970af44fd257aa749b8188
SHA1ab1b854753df9bca8d26b0893ffb311a4d3ff2e2
SHA256ad362a9da6019d4bfa31fcfa43d3a7a823f3b8642f6d7bd410b3f590a596bdf1
SHA5127a7d9bb4258f4bc1a164635ba2d59d0a7c8681358e1d66c58056678ddc01d58af08ea30c33d64e081f0cdc4c60a26b762a45c228417e8678f0fff72f14c620a6
-
Filesize
60KB
MD5260d3107d0970af44fd257aa749b8188
SHA1ab1b854753df9bca8d26b0893ffb311a4d3ff2e2
SHA256ad362a9da6019d4bfa31fcfa43d3a7a823f3b8642f6d7bd410b3f590a596bdf1
SHA5127a7d9bb4258f4bc1a164635ba2d59d0a7c8681358e1d66c58056678ddc01d58af08ea30c33d64e081f0cdc4c60a26b762a45c228417e8678f0fff72f14c620a6
-
Filesize
60KB
MD5260d3107d0970af44fd257aa749b8188
SHA1ab1b854753df9bca8d26b0893ffb311a4d3ff2e2
SHA256ad362a9da6019d4bfa31fcfa43d3a7a823f3b8642f6d7bd410b3f590a596bdf1
SHA5127a7d9bb4258f4bc1a164635ba2d59d0a7c8681358e1d66c58056678ddc01d58af08ea30c33d64e081f0cdc4c60a26b762a45c228417e8678f0fff72f14c620a6