Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 13:56 UTC
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2a42dd4f4804d66609503f2c3dd383b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2a42dd4f4804d66609503f2c3dd383b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2a42dd4f4804d66609503f2c3dd383b0.exe
-
Size
364KB
-
MD5
2a42dd4f4804d66609503f2c3dd383b0
-
SHA1
eb54f17b26300b6c61f1eb78f8287ec8823500a9
-
SHA256
99b6f9cf98836ad08b83e42e73151fc14ea6f4ceb1fdd64fe190b086b67b83a9
-
SHA512
22521b11675d6aab2e1f389b5bd0ff915090fdf477f3b3178fcdca09336a440b4e62c0fe5fa8ae9308d8c185743ba1c2463b00c8094a3ec1700426a0d41687c7
-
SSDEEP
3072:J/yXvD2enVN5UkLPp1f5mbUM96Zvx+UZkxvU84xUa4bjRTItEcmHA:J/yfD2Apf04GuvIUZeqJ2jydmHA
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2688 dhuqaed.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dhuqaed.exe NEAS.2a42dd4f4804d66609503f2c3dd383b0.exe File created C:\PROGRA~3\Mozilla\fjgblbm.dll dhuqaed.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2344 NEAS.2a42dd4f4804d66609503f2c3dd383b0.exe 2688 dhuqaed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2688 2320 taskeng.exe 29 PID 2320 wrote to memory of 2688 2320 taskeng.exe 29 PID 2320 wrote to memory of 2688 2320 taskeng.exe 29 PID 2320 wrote to memory of 2688 2320 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2a42dd4f4804d66609503f2c3dd383b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2a42dd4f4804d66609503f2c3dd383b0.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2344
-
C:\Windows\system32\taskeng.exetaskeng.exe {37EDC350-0D08-4AD1-B9AC-4CBE3D581C71} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\PROGRA~3\Mozilla\dhuqaed.exeC:\PROGRA~3\Mozilla\dhuqaed.exe -vpwggce2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD59d6cf91de793374e90288ea23fbcf714
SHA12d81334a9a7d4c8533b3f78d20ba768258b1fca9
SHA2564ba62b5cbff6bfb4a70de9c297b51cc085972d70de1dfdea88969b9ec41b83e7
SHA5123d455890a2dd9fb3d0d8acc1987c1a57c591a2d42d17f8017afccfc833d34b15e072862666148cb4aa87c35bf0e16ea6c81adf1a9d91eb6b745bae5ecfcf0c4b
-
Filesize
364KB
MD59d6cf91de793374e90288ea23fbcf714
SHA12d81334a9a7d4c8533b3f78d20ba768258b1fca9
SHA2564ba62b5cbff6bfb4a70de9c297b51cc085972d70de1dfdea88969b9ec41b83e7
SHA5123d455890a2dd9fb3d0d8acc1987c1a57c591a2d42d17f8017afccfc833d34b15e072862666148cb4aa87c35bf0e16ea6c81adf1a9d91eb6b745bae5ecfcf0c4b