Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
28/10/2023, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2825e4a1b69997cea67a3a772de425c0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2825e4a1b69997cea67a3a772de425c0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2825e4a1b69997cea67a3a772de425c0.exe
-
Size
70KB
-
MD5
2825e4a1b69997cea67a3a772de425c0
-
SHA1
37122449bfd00aad0c4e0667517c17275fde76ca
-
SHA256
dc675548d26d4089a3a2e0eb8cfc3f3cded185dd7d2c11d5340cff6d18619689
-
SHA512
359706a55da9d64cf0c2cacfb58f2f2ef398cb8f3fbabacdec29c468e0893b30a9f21463a372c964aa456caed53c2afde64288eddb1b5e2916e9585a38382a69
-
SSDEEP
768:TrItKyw5WHXfQmjIiIk9ecAayMb96gyXPDLd+T:Tr3Z5IfQmv81a5DyXbZC
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2892 attrib.exe -
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2624 zskhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\zskhost.exe NEAS.2825e4a1b69997cea67a3a772de425c0.exe File opened for modification C:\Windows\Debug\zskhost.exe NEAS.2825e4a1b69997cea67a3a772de425c0.exe File opened for modification C:\Windows\Debug\zskhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2364 NEAS.2825e4a1b69997cea67a3a772de425c0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2892 2364 NEAS.2825e4a1b69997cea67a3a772de425c0.exe 28 PID 2364 wrote to memory of 2892 2364 NEAS.2825e4a1b69997cea67a3a772de425c0.exe 28 PID 2364 wrote to memory of 2892 2364 NEAS.2825e4a1b69997cea67a3a772de425c0.exe 28 PID 2364 wrote to memory of 2892 2364 NEAS.2825e4a1b69997cea67a3a772de425c0.exe 28 PID 2364 wrote to memory of 2748 2364 NEAS.2825e4a1b69997cea67a3a772de425c0.exe 31 PID 2364 wrote to memory of 2748 2364 NEAS.2825e4a1b69997cea67a3a772de425c0.exe 31 PID 2364 wrote to memory of 2748 2364 NEAS.2825e4a1b69997cea67a3a772de425c0.exe 31 PID 2364 wrote to memory of 2748 2364 NEAS.2825e4a1b69997cea67a3a772de425c0.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2892 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2825e4a1b69997cea67a3a772de425c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2825e4a1b69997cea67a3a772de425c0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\zskhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEAS28~1.EXE > nul2⤵
- Deletes itself
PID:2748
-
-
C:\Windows\Debug\zskhost.exeC:\Windows\Debug\zskhost.exe1⤵
- Executes dropped EXE
PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5f73bb9a054e06853181daa62ae69dcf9
SHA11959e6c54492abf1b9b3708e08221a070419bf6a
SHA256b025185dc6cfa1abbfbed5a0d4b6d8073bef18773dc474abc27257a7385b7fb7
SHA512e1da92022d7ffbba2ddde7459aab9919c538810ff046f001385bcfa534d669962d0d0ea81f75a998219a3059d67dd5746aaf1dac43cd5c41b67886bdc64de494
-
Filesize
70KB
MD5f73bb9a054e06853181daa62ae69dcf9
SHA11959e6c54492abf1b9b3708e08221a070419bf6a
SHA256b025185dc6cfa1abbfbed5a0d4b6d8073bef18773dc474abc27257a7385b7fb7
SHA512e1da92022d7ffbba2ddde7459aab9919c538810ff046f001385bcfa534d669962d0d0ea81f75a998219a3059d67dd5746aaf1dac43cd5c41b67886bdc64de494