Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 05:40

General

  • Target

    NEAS.a2c45c8e62ba92fdfa2eab67dbf007c0.exe

  • Size

    7.8MB

  • MD5

    a2c45c8e62ba92fdfa2eab67dbf007c0

  • SHA1

    f5d1ec34dd92a08a5489a98ad6261d0adf06375b

  • SHA256

    17e7243f923b6224f5be5b71b9fc1d2c463b408a2346b54c1acf06f462f201a5

  • SHA512

    edb70e771a15471b3d5d6681ef11d356819569ecae6c3d440f58f4b883c47d5447c7cf3ac89989384a8f61e69a167fe6c120025236e0cafbd42058266d45e5d1

  • SSDEEP

    196608:9s6co0IoOpxQ4m3/QeV9J/2niyJ+6VrL2qJ3oA:Uojtrm3DV9JGjGqFv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a2c45c8e62ba92fdfa2eab67dbf007c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.a2c45c8e62ba92fdfa2eab67dbf007c0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\is-8P8NE.tmp\NEAS.a2c45c8e62ba92fdfa2eab67dbf007c0.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8P8NE.tmp\NEAS.a2c45c8e62ba92fdfa2eab67dbf007c0.tmp" /SL5="$30142,7888651,84992,C:\Users\Admin\AppData\Local\Temp\NEAS.a2c45c8e62ba92fdfa2eab67dbf007c0.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Delete /F /TN "DL1028-3"
        3⤵
          PID:2880
        • C:\Program Files (x86)\DataLib\DataLib.exe
          "C:\Program Files (x86)\DataLib\DataLib.exe"
          3⤵
          • Executes dropped EXE
          PID:108
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Query
          3⤵
            PID:2924
          • C:\Program Files (x86)\DataLib\DataLib.exe
            "C:\Program Files (x86)\DataLib\DataLib.exe" 3c844a93d9b76e9ab91bdbd08fb1d369
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1916

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\DataLib\DataLib.exe

        Filesize

        4.9MB

        MD5

        302ce91efd12b0921660bd5472217c1f

        SHA1

        ded919c5a3187685344de2e565f4db2fdb699261

        SHA256

        7f4f7a86cc41c16c0ded2ffbc852559857c9510094f192a1f40f0ac60c3ab47c

        SHA512

        9fed53b555b5653f6de25c403593f66cd026dce02cf884b8e3fa9942c03947c53c33639e750d1a82778c6fe0f5e6f77525e35e6cf25785cf7a14490c913c0ff3

      • C:\Program Files (x86)\DataLib\DataLib.exe

        Filesize

        4.9MB

        MD5

        302ce91efd12b0921660bd5472217c1f

        SHA1

        ded919c5a3187685344de2e565f4db2fdb699261

        SHA256

        7f4f7a86cc41c16c0ded2ffbc852559857c9510094f192a1f40f0ac60c3ab47c

        SHA512

        9fed53b555b5653f6de25c403593f66cd026dce02cf884b8e3fa9942c03947c53c33639e750d1a82778c6fe0f5e6f77525e35e6cf25785cf7a14490c913c0ff3

      • C:\Users\Admin\AppData\Local\Temp\is-8P8NE.tmp\NEAS.a2c45c8e62ba92fdfa2eab67dbf007c0.tmp

        Filesize

        710KB

        MD5

        cbbf8771d950e9cdaf90c2f51fa89eae

        SHA1

        fec707cb99db603a5af0648b6694195e134b5bf2

        SHA256

        53817a61e53ecf3bd3737f1ade9015b77d274517c8b13e5c35f428a982c000ba

        SHA512

        2f8f08581c18c11a7c706402b1dc82683670176599201b79b9598c68ad19f859bad7e2c3a31769f52e08a7828b5ba5302116309f138d78b405e55967fb509cc6

      • C:\Users\Admin\AppData\Local\Temp\is-8P8NE.tmp\NEAS.a2c45c8e62ba92fdfa2eab67dbf007c0.tmp

        Filesize

        710KB

        MD5

        cbbf8771d950e9cdaf90c2f51fa89eae

        SHA1

        fec707cb99db603a5af0648b6694195e134b5bf2

        SHA256

        53817a61e53ecf3bd3737f1ade9015b77d274517c8b13e5c35f428a982c000ba

        SHA512

        2f8f08581c18c11a7c706402b1dc82683670176599201b79b9598c68ad19f859bad7e2c3a31769f52e08a7828b5ba5302116309f138d78b405e55967fb509cc6

      • \Program Files (x86)\DataLib\DataLib.exe

        Filesize

        4.9MB

        MD5

        302ce91efd12b0921660bd5472217c1f

        SHA1

        ded919c5a3187685344de2e565f4db2fdb699261

        SHA256

        7f4f7a86cc41c16c0ded2ffbc852559857c9510094f192a1f40f0ac60c3ab47c

        SHA512

        9fed53b555b5653f6de25c403593f66cd026dce02cf884b8e3fa9942c03947c53c33639e750d1a82778c6fe0f5e6f77525e35e6cf25785cf7a14490c913c0ff3

      • \Users\Admin\AppData\Local\Temp\is-4UTMH.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-4UTMH.tmp\_isetup\_shfoldr.dll

        Filesize

        22KB

        MD5

        92dc6ef532fbb4a5c3201469a5b5eb63

        SHA1

        3e89ff837147c16b4e41c30d6c796374e0b8e62c

        SHA256

        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

        SHA512

        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

      • \Users\Admin\AppData\Local\Temp\is-4UTMH.tmp\_isetup\_shfoldr.dll

        Filesize

        22KB

        MD5

        92dc6ef532fbb4a5c3201469a5b5eb63

        SHA1

        3e89ff837147c16b4e41c30d6c796374e0b8e62c

        SHA256

        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

        SHA512

        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

      • \Users\Admin\AppData\Local\Temp\is-8P8NE.tmp\NEAS.a2c45c8e62ba92fdfa2eab67dbf007c0.tmp

        Filesize

        710KB

        MD5

        cbbf8771d950e9cdaf90c2f51fa89eae

        SHA1

        fec707cb99db603a5af0648b6694195e134b5bf2

        SHA256

        53817a61e53ecf3bd3737f1ade9015b77d274517c8b13e5c35f428a982c000ba

        SHA512

        2f8f08581c18c11a7c706402b1dc82683670176599201b79b9598c68ad19f859bad7e2c3a31769f52e08a7828b5ba5302116309f138d78b405e55967fb509cc6

      • memory/108-166-0x0000000000400000-0x0000000000CE0000-memory.dmp

        Filesize

        8.9MB

      • memory/108-172-0x0000000000400000-0x0000000000CE0000-memory.dmp

        Filesize

        8.9MB

      • memory/108-162-0x0000000000400000-0x0000000000CE0000-memory.dmp

        Filesize

        8.9MB

      • memory/108-163-0x0000000000400000-0x0000000000CE0000-memory.dmp

        Filesize

        8.9MB

      • memory/108-167-0x00000000003F0000-0x00000000003F1000-memory.dmp

        Filesize

        4KB

      • memory/1916-176-0x0000000000400000-0x0000000000CE0000-memory.dmp

        Filesize

        8.9MB

      • memory/1916-177-0x0000000000E90000-0x0000000000E91000-memory.dmp

        Filesize

        4KB

      • memory/1916-186-0x0000000000400000-0x0000000000CE0000-memory.dmp

        Filesize

        8.9MB

      • memory/1916-183-0x0000000000E90000-0x0000000000E91000-memory.dmp

        Filesize

        4KB

      • memory/1916-182-0x0000000000400000-0x0000000000CE0000-memory.dmp

        Filesize

        8.9MB

      • memory/1916-181-0x0000000000400000-0x0000000000CE0000-memory.dmp

        Filesize

        8.9MB

      • memory/1916-180-0x0000000000400000-0x0000000000CE0000-memory.dmp

        Filesize

        8.9MB

      • memory/2124-0-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/2124-164-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/2192-165-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2192-179-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/2192-7-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2192-161-0x0000000003B40000-0x0000000004420000-memory.dmp

        Filesize

        8.9MB

      • memory/2192-170-0x0000000003B40000-0x0000000004420000-memory.dmp

        Filesize

        8.9MB

      • memory/2192-169-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB