Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 19:22
Behavioral task
behavioral1
Sample
NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe
-
Size
188KB
-
MD5
6bfee40e596a6c1159d3b26387bb67d0
-
SHA1
bf79cef3a20a3d337d2f3f54be0948e6d0363025
-
SHA256
7d64cc2887a9be7e1740059a02b8b70c8a045aefdfe7ac18e23e9bdcc2cd81db
-
SHA512
a42907c35c7e78184aa0a3b157c4103f15f376f5a9ba8c7221f0508261637a71630837e43fc69f89c3b483d7b782707ed0f209c07b011695dd2d3a73fc4c3514
-
SSDEEP
3072:Rc2YlPYqPt7EYjQ9oDJG7zdeGBYIGTPCMJLj9uqgnaIEXvDcGH2abADBS:qf5Pt7VOe7CMJVFgaX/FWabAo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 856 MWL_DecryptFile.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe 2196 NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe -
resource yara_rule behavioral1/memory/2196-2-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x000d00000001200b-10.dat upx behavioral1/files/0x000d00000001200b-8.dat upx behavioral1/files/0x000d00000001200b-6.dat upx behavioral1/files/0x000d00000001200b-4.dat upx behavioral1/memory/856-14-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2196-11-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/856-16-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-17-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-18-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-19-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-20-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-21-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-22-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-23-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-24-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-25-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-26-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-27-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-28-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-29-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/856-30-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 856 MWL_DecryptFile.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 856 MWL_DecryptFile.exe 856 MWL_DecryptFile.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 856 2196 NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe 28 PID 2196 wrote to memory of 856 2196 NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe 28 PID 2196 wrote to memory of 856 2196 NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe 28 PID 2196 wrote to memory of 856 2196 NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\MWL_DecryptFile.exe"C:\Users\Admin\AppData\Local\Temp\MWL_DecryptFile.exe" "C:\Users\Admin\AppData\Local\Temp\NEAS.6bfee40e596a6c1159d3b26387bb67d0_JC.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5f870f701ef885f2ffe92eb9766d8df10
SHA15ef9d0b3eb778b5fdfe6a30994e1e60f2fd3d612
SHA256903122b7607aaea06fd0d6208f707b75f4d5af8283c412aa2d48c2d3cfd4f291
SHA5123e9d8e38af55505b1a50aeba1bb551bacd4e717fef1323fe8abc17273e40e92acf2789550719e7d72a1bc3cf1cfdf9dc5c2ba278eca4139225340fc25a65c4d7
-
Filesize
52KB
MD5f870f701ef885f2ffe92eb9766d8df10
SHA15ef9d0b3eb778b5fdfe6a30994e1e60f2fd3d612
SHA256903122b7607aaea06fd0d6208f707b75f4d5af8283c412aa2d48c2d3cfd4f291
SHA5123e9d8e38af55505b1a50aeba1bb551bacd4e717fef1323fe8abc17273e40e92acf2789550719e7d72a1bc3cf1cfdf9dc5c2ba278eca4139225340fc25a65c4d7
-
Filesize
52KB
MD5f870f701ef885f2ffe92eb9766d8df10
SHA15ef9d0b3eb778b5fdfe6a30994e1e60f2fd3d612
SHA256903122b7607aaea06fd0d6208f707b75f4d5af8283c412aa2d48c2d3cfd4f291
SHA5123e9d8e38af55505b1a50aeba1bb551bacd4e717fef1323fe8abc17273e40e92acf2789550719e7d72a1bc3cf1cfdf9dc5c2ba278eca4139225340fc25a65c4d7
-
Filesize
52KB
MD5f870f701ef885f2ffe92eb9766d8df10
SHA15ef9d0b3eb778b5fdfe6a30994e1e60f2fd3d612
SHA256903122b7607aaea06fd0d6208f707b75f4d5af8283c412aa2d48c2d3cfd4f291
SHA5123e9d8e38af55505b1a50aeba1bb551bacd4e717fef1323fe8abc17273e40e92acf2789550719e7d72a1bc3cf1cfdf9dc5c2ba278eca4139225340fc25a65c4d7