Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2023, 22:10

General

  • Target

    NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe

  • Size

    213KB

  • MD5

    8a4245239cda711dcc3f40df1950aa80

  • SHA1

    be473967059340e155ec3a4db31e360782c14099

  • SHA256

    ba35400aaab8fb5fec958d08c984d32e0b82b88d9821328bec802c9ce195c1c8

  • SHA512

    1a75b0fa6a6c57caab81bd1865c619739abc9d40c1fdd244961c316680237b26e4c9e936254b24d611daa8d319e44a3db2c123260d9ea62ee200616c6c8e447a

  • SSDEEP

    3072:bWGcbBBXk6+ca2Rq+QQLPaXfYypX5WftirnOT8e2CvOP6ubRzjdpu5hu:k1BU6FXq+QQs9pW8rnSv2qd6lj

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2840
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {EB3594D7-E001-4F1D-ABA2-B999F593C43C} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\PROGRA~3\Mozilla\wwljcul.exe
      C:\PROGRA~3\Mozilla\wwljcul.exe -anxczaj
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\wwljcul.exe

    Filesize

    213KB

    MD5

    b0da3e732e701d32d6e8bc23983e4859

    SHA1

    0e09c4235ef35d1334be7475a8245dbf849517d5

    SHA256

    aa8ca9d715bbb954f834752d47a8c6a282191f63dcbba08188ca438b35b3c03c

    SHA512

    95f012f81620db2f011242a134c6c1a5e3dbd27c3d4bf39dd4738d85763b1b42bfcbf41167463803e7b048365e307d3ba41bd05a3c513337508c5626acda6a20

  • C:\PROGRA~3\Mozilla\wwljcul.exe

    Filesize

    213KB

    MD5

    b0da3e732e701d32d6e8bc23983e4859

    SHA1

    0e09c4235ef35d1334be7475a8245dbf849517d5

    SHA256

    aa8ca9d715bbb954f834752d47a8c6a282191f63dcbba08188ca438b35b3c03c

    SHA512

    95f012f81620db2f011242a134c6c1a5e3dbd27c3d4bf39dd4738d85763b1b42bfcbf41167463803e7b048365e307d3ba41bd05a3c513337508c5626acda6a20

  • memory/2840-0-0x0000000000290000-0x00000000002EB000-memory.dmp

    Filesize

    364KB

  • memory/2840-1-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2840-3-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3068-6-0x0000000000840000-0x000000000089B000-memory.dmp

    Filesize

    364KB

  • memory/3068-7-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3068-9-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3068-10-0x0000000000840000-0x000000000089B000-memory.dmp

    Filesize

    364KB