Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:24
Behavioral task
behavioral1
Sample
NEAS.71c022b5d39cbb9c257c8b94589651c0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.71c022b5d39cbb9c257c8b94589651c0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.71c022b5d39cbb9c257c8b94589651c0.exe
-
Size
93KB
-
MD5
71c022b5d39cbb9c257c8b94589651c0
-
SHA1
53093fe1b1b50eaebca6ebe61e99c164b6f0dd78
-
SHA256
e756c1b0bfdb4acb22d4dfe6e50a47b08d83b5e62d18b4b35ae45216912282b0
-
SHA512
9b851bf62ba05a63be9bce91d8ac7194038d1a913f4194871f8a501518f865a0efb5bb5a6bfed81ccc5dca1d5aeb2ccb8b2b9b2754071db20577185ce388d4bf
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9i4RR5:zCsanOtEvwDpjM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1244 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1364 NEAS.71c022b5d39cbb9c257c8b94589651c0.exe -
resource yara_rule behavioral1/memory/1364-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000b000000012021-11.dat upx behavioral1/memory/1244-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000b000000012021-15.dat upx behavioral1/memory/1364-14-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000b000000012021-25.dat upx behavioral1/memory/1244-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1244 1364 NEAS.71c022b5d39cbb9c257c8b94589651c0.exe 29 PID 1364 wrote to memory of 1244 1364 NEAS.71c022b5d39cbb9c257c8b94589651c0.exe 29 PID 1364 wrote to memory of 1244 1364 NEAS.71c022b5d39cbb9c257c8b94589651c0.exe 29 PID 1364 wrote to memory of 1244 1364 NEAS.71c022b5d39cbb9c257c8b94589651c0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.71c022b5d39cbb9c257c8b94589651c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.71c022b5d39cbb9c257c8b94589651c0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD551f7a10220e970bf01bc8e155481248a
SHA1bd73d4a903d13707cd9e99781337c4c3b6c37341
SHA256caa10c4f42c5d4802a48c74875bade91991ddb64ab27b0ec252add9b5141f9ce
SHA51278c5ecd489f888a3c682d0a1e3158a2be8c234a636f76a8ce4fe77b89f737b1a2d7282e84fd84fa9e9ad09c0fdf08e318fd4beb4e68ec23b1206ec6036a9b109
-
Filesize
93KB
MD551f7a10220e970bf01bc8e155481248a
SHA1bd73d4a903d13707cd9e99781337c4c3b6c37341
SHA256caa10c4f42c5d4802a48c74875bade91991ddb64ab27b0ec252add9b5141f9ce
SHA51278c5ecd489f888a3c682d0a1e3158a2be8c234a636f76a8ce4fe77b89f737b1a2d7282e84fd84fa9e9ad09c0fdf08e318fd4beb4e68ec23b1206ec6036a9b109
-
Filesize
93KB
MD551f7a10220e970bf01bc8e155481248a
SHA1bd73d4a903d13707cd9e99781337c4c3b6c37341
SHA256caa10c4f42c5d4802a48c74875bade91991ddb64ab27b0ec252add9b5141f9ce
SHA51278c5ecd489f888a3c682d0a1e3158a2be8c234a636f76a8ce4fe77b89f737b1a2d7282e84fd84fa9e9ad09c0fdf08e318fd4beb4e68ec23b1206ec6036a9b109