Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d3361da06cd587144d52d92ad1db72e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d3361da06cd587144d52d92ad1db72e0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d3361da06cd587144d52d92ad1db72e0.exe
-
Size
887KB
-
MD5
d3361da06cd587144d52d92ad1db72e0
-
SHA1
0f4b929e7065bb69651ac6c45c127e3064392e78
-
SHA256
a0b31406c25e0533efc68a0cd1023e7bf0b7d2efd7f829d51d1953721ca4b0e1
-
SHA512
2a84c11fd8aa6b38dbd7c9775c12373ce2c04c31c82cb83d763195c21bf279ef162bf3c1e7215fca5e8482d238a1ce3bed755449c44d1b42baf6cdda12cda12e
-
SSDEEP
24576:1D16eB79ccc7cP/bDHHIp04rgZx9A7uDIVzWDJD1QB/1E3U+dmFOJlnC8UcccvXw:1D16eBhccc7cP/bDHHIp04rgZx9A7uDs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1464 NEAS.d3361da06cd587144d52d92ad1db72e0.exe -
Executes dropped EXE 1 IoCs
pid Process 1464 NEAS.d3361da06cd587144d52d92ad1db72e0.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4416 1680 WerFault.exe 88 1696 1464 WerFault.exe 96 1332 1464 WerFault.exe 96 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1680 NEAS.d3361da06cd587144d52d92ad1db72e0.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1464 NEAS.d3361da06cd587144d52d92ad1db72e0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1464 1680 NEAS.d3361da06cd587144d52d92ad1db72e0.exe 96 PID 1680 wrote to memory of 1464 1680 NEAS.d3361da06cd587144d52d92ad1db72e0.exe 96 PID 1680 wrote to memory of 1464 1680 NEAS.d3361da06cd587144d52d92ad1db72e0.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d3361da06cd587144d52d92ad1db72e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d3361da06cd587144d52d92ad1db72e0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 3522⤵
- Program crash
PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d3361da06cd587144d52d92ad1db72e0.exeC:\Users\Admin\AppData\Local\Temp\NEAS.d3361da06cd587144d52d92ad1db72e0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 3443⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 3963⤵
- Program crash
PID:1332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1680 -ip 16801⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1464 -ip 14641⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1464 -ip 14641⤵PID:1992
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
887KB
MD57203013e8db0d166fde9deecb5613ee7
SHA12c25e09e9538b751af1eca4cec0dabe5c70e94f5
SHA25609ada2ef8609c5690da1c4471f488ae28e2be3ec35e14bf0ed338dafcadbce77
SHA51212dc940518f8d0bf4f50b2cd921a29d3eebc41973e6c2349fbb4cad7b82381bcfcc350ccf3983ce1d4f3156cb4ecfb43caaf9598ece1ca7b42244065cab244d4