Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ccf77b21ac8b60c8ab71bfba2dc77cd0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ccf77b21ac8b60c8ab71bfba2dc77cd0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.ccf77b21ac8b60c8ab71bfba2dc77cd0.exe
-
Size
112KB
-
MD5
ccf77b21ac8b60c8ab71bfba2dc77cd0
-
SHA1
af842cbec42c1399d973256f606faadc7f8c1772
-
SHA256
49e932884330de25011ed074a980936abd8181e2daf3de40a3de171d1825341f
-
SHA512
38aac6bcb141a93c592a3c47b591bc58040d2f8741064caa2b81402b2f43757ebcac8b1bb0d55e27fe0e72349f0be15e1222b3589e1c443e6f74288e97eeee4d
-
SSDEEP
3072:bigRqGiY/IA8wD5iZ4gKczBxGV6+UIXlaMA+uzlC1:yw/IFwDox+UGg5XzlC1
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2604 adxhgfe.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\adxhgfe.exe NEAS.ccf77b21ac8b60c8ab71bfba2dc77cd0.exe File created C:\PROGRA~3\Mozilla\torzssd.dll adxhgfe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2604 1704 taskeng.exe 29 PID 1704 wrote to memory of 2604 1704 taskeng.exe 29 PID 1704 wrote to memory of 2604 1704 taskeng.exe 29 PID 1704 wrote to memory of 2604 1704 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ccf77b21ac8b60c8ab71bfba2dc77cd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ccf77b21ac8b60c8ab71bfba2dc77cd0.exe"1⤵
- Drops file in Program Files directory
PID:2196
-
C:\Windows\system32\taskeng.exetaskeng.exe {FBB36A8F-7521-40E7-9775-4F6648968352} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\PROGRA~3\Mozilla\adxhgfe.exeC:\PROGRA~3\Mozilla\adxhgfe.exe -iwcrppa2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD56c86a14d223630971c6aa45d4dc210c3
SHA14e9723f6d8f581510244a0ac9aa6647a5b1cdf37
SHA25695a1fc11d481120ce708f073356f6c93ecf895cb29546187a34e5da66f06aaa5
SHA51220232117925dee891bd31cf94e7be06a696bbb7a1fae7c22a0bdba499b7bc4d10d4105f252580edaf5066e4b9ae7bb8b04c37fd369b4b551c4e8e6dc6ae130ad
-
Filesize
112KB
MD56c86a14d223630971c6aa45d4dc210c3
SHA14e9723f6d8f581510244a0ac9aa6647a5b1cdf37
SHA25695a1fc11d481120ce708f073356f6c93ecf895cb29546187a34e5da66f06aaa5
SHA51220232117925dee891bd31cf94e7be06a696bbb7a1fae7c22a0bdba499b7bc4d10d4105f252580edaf5066e4b9ae7bb8b04c37fd369b4b551c4e8e6dc6ae130ad