Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe
-
Size
213KB
-
MD5
8a4245239cda711dcc3f40df1950aa80
-
SHA1
be473967059340e155ec3a4db31e360782c14099
-
SHA256
ba35400aaab8fb5fec958d08c984d32e0b82b88d9821328bec802c9ce195c1c8
-
SHA512
1a75b0fa6a6c57caab81bd1865c619739abc9d40c1fdd244961c316680237b26e4c9e936254b24d611daa8d319e44a3db2c123260d9ea62ee200616c6c8e447a
-
SSDEEP
3072:bWGcbBBXk6+ca2Rq+QQLPaXfYypX5WftirnOT8e2CvOP6ubRzjdpu5hu:k1BU6FXq+QQs9pW8rnSv2qd6lj
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3068 wwljcul.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\wwljcul.exe NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe File created C:\PROGRA~3\Mozilla\sdwojsn.dll wwljcul.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2840 NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe 3068 wwljcul.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3068 2700 taskeng.exe 29 PID 2700 wrote to memory of 3068 2700 taskeng.exe 29 PID 2700 wrote to memory of 3068 2700 taskeng.exe 29 PID 2700 wrote to memory of 3068 2700 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8a4245239cda711dcc3f40df1950aa80_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2840
-
C:\Windows\system32\taskeng.exetaskeng.exe {EB3594D7-E001-4F1D-ABA2-B999F593C43C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\PROGRA~3\Mozilla\wwljcul.exeC:\PROGRA~3\Mozilla\wwljcul.exe -anxczaj2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5b0da3e732e701d32d6e8bc23983e4859
SHA10e09c4235ef35d1334be7475a8245dbf849517d5
SHA256aa8ca9d715bbb954f834752d47a8c6a282191f63dcbba08188ca438b35b3c03c
SHA51295f012f81620db2f011242a134c6c1a5e3dbd27c3d4bf39dd4738d85763b1b42bfcbf41167463803e7b048365e307d3ba41bd05a3c513337508c5626acda6a20
-
Filesize
213KB
MD5b0da3e732e701d32d6e8bc23983e4859
SHA10e09c4235ef35d1334be7475a8245dbf849517d5
SHA256aa8ca9d715bbb954f834752d47a8c6a282191f63dcbba08188ca438b35b3c03c
SHA51295f012f81620db2f011242a134c6c1a5e3dbd27c3d4bf39dd4738d85763b1b42bfcbf41167463803e7b048365e307d3ba41bd05a3c513337508c5626acda6a20