Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    22/10/2023, 16:46

General

  • Target

    NEAS.07c31b8c9477c36c80c6a555832b3be0.exe

  • Size

    1.7MB

  • MD5

    07c31b8c9477c36c80c6a555832b3be0

  • SHA1

    258d6bd264632b95a07c5c45dc90883fd9efa62b

  • SHA256

    de769c7b39d44bd9bd3ebb02e12e49c90ab4e55ac0de000096fb6841c14df4d2

  • SHA512

    f63d9fea4aa689cb2178405254db8b0f75f11221e35eeaba88f9f71445d9f727e68763f6ab9eb0b01e19032ab6390f45a21e687c2fca0105dfbc1b3596a502a7

  • SSDEEP

    49152:MtIWcS4neHbyfYTOYKObutmkO+wAOInO4XrztygxLHkJE4VBq:MtqS4neHYs+wE9XD8VBq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2856
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev4921.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE
        3⤵
        • Executes dropped EXE
        PID:2796
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev4921.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE

    Filesize

    1.7MB

    MD5

    70c95e3b08e52e0458dc9f857403b5b9

    SHA1

    6f4e905c446c24d9877132c96f31137d498f3ecc

    SHA256

    ab8de084c95b8bc0bd31125a381716c6df151d15ebf58cbcc2eb69753a5d716d

    SHA512

    cca4a393837c8ad921592cde915ab3fb2389f3e80862b96952e4591cc097db05bcaea99a36dcbe8fcbc3fbb0facd7e8626066f530ed27bedabd3531ec29de112

  • C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE

    Filesize

    1.7MB

    MD5

    70c95e3b08e52e0458dc9f857403b5b9

    SHA1

    6f4e905c446c24d9877132c96f31137d498f3ecc

    SHA256

    ab8de084c95b8bc0bd31125a381716c6df151d15ebf58cbcc2eb69753a5d716d

    SHA512

    cca4a393837c8ad921592cde915ab3fb2389f3e80862b96952e4591cc097db05bcaea99a36dcbe8fcbc3fbb0facd7e8626066f530ed27bedabd3531ec29de112

  • C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe

    Filesize

    794KB

    MD5

    c6d0721e9156eb2a40a04bb38be0b2a5

    SHA1

    d0a3fcb3ad9f227a02d30abb767883b42fecc3a7

    SHA256

    2435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d

    SHA512

    e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    960KB

    MD5

    808de4b2bfdad481ba9f4e153093b250

    SHA1

    9a9ab72e76755d30978b589c9c2c138c5ba7ec65

    SHA256

    5adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692

    SHA512

    c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab

  • C:\Windows\MSWDM.EXE

    Filesize

    960KB

    MD5

    808de4b2bfdad481ba9f4e153093b250

    SHA1

    9a9ab72e76755d30978b589c9c2c138c5ba7ec65

    SHA256

    5adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692

    SHA512

    c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab

  • C:\Windows\MSWDM.EXE

    Filesize

    960KB

    MD5

    808de4b2bfdad481ba9f4e153093b250

    SHA1

    9a9ab72e76755d30978b589c9c2c138c5ba7ec65

    SHA256

    5adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692

    SHA512

    c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab

  • C:\Windows\MSWDM.EXE

    Filesize

    960KB

    MD5

    808de4b2bfdad481ba9f4e153093b250

    SHA1

    9a9ab72e76755d30978b589c9c2c138c5ba7ec65

    SHA256

    5adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692

    SHA512

    c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab

  • C:\Windows\MSWDM.EXE

    Filesize

    960KB

    MD5

    808de4b2bfdad481ba9f4e153093b250

    SHA1

    9a9ab72e76755d30978b589c9c2c138c5ba7ec65

    SHA256

    5adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692

    SHA512

    c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab

  • C:\Windows\dev4921.tmp

    Filesize

    794KB

    MD5

    c6d0721e9156eb2a40a04bb38be0b2a5

    SHA1

    d0a3fcb3ad9f227a02d30abb767883b42fecc3a7

    SHA256

    2435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d

    SHA512

    e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4

  • \Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe

    Filesize

    794KB

    MD5

    c6d0721e9156eb2a40a04bb38be0b2a5

    SHA1

    d0a3fcb3ad9f227a02d30abb767883b42fecc3a7

    SHA256

    2435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d

    SHA512

    e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4

  • memory/2192-12-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2192-13-0x0000000000220000-0x0000000000234000-memory.dmp

    Filesize

    80KB

  • memory/2192-36-0x0000000000220000-0x0000000000234000-memory.dmp

    Filesize

    80KB

  • memory/2192-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2676-33-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2676-31-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2856-17-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2856-37-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2948-30-0x0000000000230000-0x0000000000244000-memory.dmp

    Filesize

    80KB

  • memory/2948-18-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2948-35-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB