Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.27314bba08b184bb4343870285c48776.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.27314bba08b184bb4343870285c48776.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.27314bba08b184bb4343870285c48776.exe
-
Size
196KB
-
MD5
27314bba08b184bb4343870285c48776
-
SHA1
fc66625d693cf715470b403a71299b3a0754356b
-
SHA256
946e1190e2dd2d5e927e6d68c6680c2c3ceb49154fb30e32fea63b8382058aa4
-
SHA512
3b7e3bd554f153ab2fc710db75d0a8cf72e4551ebaa74a1363fd1c7a2f0c4b4ef1f6ccedbd13e723da0b9821276fdfc7c2e4e1ff243d3c98d05bbf877e28ba04
-
SSDEEP
1536:yvVQb4cLIkN+4Weat2RKLjWlC48Pp9JAcjrSrowuB:yvVQLIkLWeaA8KlCph9GrowuB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2004 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 NEAS.27314bba08b184bb4343870285c48776.exe 2000 NEAS.27314bba08b184bb4343870285c48776.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\50ee1495\jusched.exe NEAS.27314bba08b184bb4343870285c48776.exe File created C:\Program Files (x86)\50ee1495\50ee1495 NEAS.27314bba08b184bb4343870285c48776.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.27314bba08b184bb4343870285c48776.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2004 2000 NEAS.27314bba08b184bb4343870285c48776.exe 28 PID 2000 wrote to memory of 2004 2000 NEAS.27314bba08b184bb4343870285c48776.exe 28 PID 2000 wrote to memory of 2004 2000 NEAS.27314bba08b184bb4343870285c48776.exe 28 PID 2000 wrote to memory of 2004 2000 NEAS.27314bba08b184bb4343870285c48776.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.27314bba08b184bb4343870285c48776.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.27314bba08b184bb4343870285c48776.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\50ee1495\jusched.exe"C:\Program Files (x86)\50ee1495\jusched.exe"2⤵
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD57bdf61d37c9adf3e1c6937107016091f
SHA156b8e0c454f9dd16d508a04b3afa7e458453ac41
SHA2564c57d86c256214baa0a5a3322ef5cdd575210455b7e964ad60382bd9d4be12e0
SHA512ff4fc1a427c84f47042375749f45ee6edea73b902ae977f14243ebceb7b9a28f41fe5dd404e3ea381754d9122202bc6b61ed0152b20a1c1be76c225dd20861d1
-
Filesize
196KB
MD5cce2cbc20d13f58f2df66fd339eab6c1
SHA1c9f0f10374ec844ee18056489500ad30e22dc5a4
SHA2567f77df221af0088563f816bd47d5cefea63827b4a90ecf88712753606160821e
SHA512956984a8753860017908ed8bc94f90b17577e445ec3a685fe694b72070bca984082b368037361682679368c5010276da0d48de139a8f5ebead6f57d1d129a2a8
-
Filesize
196KB
MD5cce2cbc20d13f58f2df66fd339eab6c1
SHA1c9f0f10374ec844ee18056489500ad30e22dc5a4
SHA2567f77df221af0088563f816bd47d5cefea63827b4a90ecf88712753606160821e
SHA512956984a8753860017908ed8bc94f90b17577e445ec3a685fe694b72070bca984082b368037361682679368c5010276da0d48de139a8f5ebead6f57d1d129a2a8
-
Filesize
196KB
MD5cce2cbc20d13f58f2df66fd339eab6c1
SHA1c9f0f10374ec844ee18056489500ad30e22dc5a4
SHA2567f77df221af0088563f816bd47d5cefea63827b4a90ecf88712753606160821e
SHA512956984a8753860017908ed8bc94f90b17577e445ec3a685fe694b72070bca984082b368037361682679368c5010276da0d48de139a8f5ebead6f57d1d129a2a8
-
Filesize
196KB
MD5cce2cbc20d13f58f2df66fd339eab6c1
SHA1c9f0f10374ec844ee18056489500ad30e22dc5a4
SHA2567f77df221af0088563f816bd47d5cefea63827b4a90ecf88712753606160821e
SHA512956984a8753860017908ed8bc94f90b17577e445ec3a685fe694b72070bca984082b368037361682679368c5010276da0d48de139a8f5ebead6f57d1d129a2a8