Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a08863eb3a255738456087e25bbf6b60_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.a08863eb3a255738456087e25bbf6b60_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.a08863eb3a255738456087e25bbf6b60_JC.exe
-
Size
364KB
-
MD5
a08863eb3a255738456087e25bbf6b60
-
SHA1
e42710f1bf8896e8d478330e0793c82a3dce7b51
-
SHA256
fa9a0374c3b5b467a73ce321b210136404904da9303031c94f721b6f29f0b381
-
SHA512
31a88d383e4bb8430a058c3d0d4a5d4b5d138f9da53abad018ba216ff3e75deeeabc273508c8d1bedbb6eeeb29382b36d78715ac749eb225bb4e313e14fe7cbd
-
SSDEEP
3072:J/yXvD2enVN5UkLPp1f5mbUM96Zvx+UZkxvU84xUa4bjRTItEcmHH:J/yfD2Apf04GuvIUZeqJ2jydmHH
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3068 ajahmjj.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ajahmjj.exe NEAS.a08863eb3a255738456087e25bbf6b60_JC.exe File created C:\PROGRA~3\Mozilla\ghzyxbm.dll ajahmjj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2108 NEAS.a08863eb3a255738456087e25bbf6b60_JC.exe 3068 ajahmjj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1324 wrote to memory of 3068 1324 taskeng.exe 29 PID 1324 wrote to memory of 3068 1324 taskeng.exe 29 PID 1324 wrote to memory of 3068 1324 taskeng.exe 29 PID 1324 wrote to memory of 3068 1324 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a08863eb3a255738456087e25bbf6b60_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a08863eb3a255738456087e25bbf6b60_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2108
-
C:\Windows\system32\taskeng.exetaskeng.exe {EBE97157-1A53-45F6-B92E-F4EB03477E79} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\PROGRA~3\Mozilla\ajahmjj.exeC:\PROGRA~3\Mozilla\ajahmjj.exe -mngyzad2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD5a72740ca54b63ae641bc6de2b51e5aca
SHA1035cb9111643970ccee68ce17df9a6fd0b4c7afa
SHA256f443d8277c56e464d2ea37e27d826be4ac149d2cfbf575e928811e5d03eeef5c
SHA512f32734110ab3a3a64d1fbccfd5c30d36202c5d8a86d7efc4447707c15033d690d1bd4d564c20c5c158428fc1e9b5a08386b8e9eafd197a09e4358896cea26e79
-
Filesize
364KB
MD5a72740ca54b63ae641bc6de2b51e5aca
SHA1035cb9111643970ccee68ce17df9a6fd0b4c7afa
SHA256f443d8277c56e464d2ea37e27d826be4ac149d2cfbf575e928811e5d03eeef5c
SHA512f32734110ab3a3a64d1fbccfd5c30d36202c5d8a86d7efc4447707c15033d690d1bd4d564c20c5c158428fc1e9b5a08386b8e9eafd197a09e4358896cea26e79