Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2023, 20:13

General

  • Target

    NEAS.c613bed72dd920f99b25a8e96df737c0.exe

  • Size

    965KB

  • MD5

    c613bed72dd920f99b25a8e96df737c0

  • SHA1

    8704ca8e6198c55e7fc8f639963ddec28de55642

  • SHA256

    4dbd75db53c3dc0f347234ff78429ba2045a3d75a8157f81bd5e9f12559605c1

  • SHA512

    c29b202b9bfd8f87cf04c07a2ba79775ff2774b968d52e101da4ba1b45ab86d6abe65640a2028f8508072f192382bf33500220f1a7b0cc7d23d7e64f168c5d2e

  • SSDEEP

    12288:i2ToLD2QfWUEknSsmjj/UVF4TRSEm8HFTjMVJK1P5aEL3L7yhxoeVsc:ikuPfWsnnw/UV+RSEm8HZMVcRaE2v1

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c613bed72dd920f99b25a8e96df737c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c613bed72dd920f99b25a8e96df737c0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: RenamesItself
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c613bed72dd920f99b25a8e96df737c0.exe

    Filesize

    965KB

    MD5

    3b005ec8deced5383c914d309d0c6ead

    SHA1

    ba865131c0e7354ecdd08269088616232e9d8c45

    SHA256

    d7dbedd3f791265dfff3a1eb127dc222837f8e5ac773c24ee4aa9e2137c91fca

    SHA512

    9fa88ab35ba7b9677f1c7e5f543a2a247e660f8b2d2ddb79035c5b1f91495715aab734b8d05f4ae8a54e74f99eb0c19e8287097bb2f456ed1396df5719aa4620

  • memory/2196-13-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-16-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-5-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2196-6-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-3-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2196-11-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-4-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-14-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-12-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-15-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-2-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-17-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-18-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-19-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB

  • memory/2196-20-0x0000000000040000-0x0000000000139000-memory.dmp

    Filesize

    996KB