Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 16:47
Behavioral task
behavioral1
Sample
NEAS.a1605551f5f51a61d20a6a5bfdfda370.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.a1605551f5f51a61d20a6a5bfdfda370.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.a1605551f5f51a61d20a6a5bfdfda370.exe
-
Size
206KB
-
MD5
a1605551f5f51a61d20a6a5bfdfda370
-
SHA1
efd6126a054b17a73025067041d6fcaf5fa58ff6
-
SHA256
01a29ca6a7852408fb515eeab5d5a0a378725b69460ce7b33d0e06cdee3e14a1
-
SHA512
884d1049d5aaddc5bef7a6c1901ee5469f885cb9e11fcc915952e891d857935e803d95260448288f6d00a61894c88066c55bf743d061ff6cc21da3afe1a1fc15
-
SSDEEP
6144:t6vPAfc8qjPVEw5f7IqfkZqFG8v6ZR0jQlsELGqpXQ:t6AaR5f7IqfkGGmElZXQ
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral1/files/0x000600000001210b-7.dat aspack_v212_v242 behavioral1/files/0x000600000001210b-8.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2372 dhuqaed.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dhuqaed.exe NEAS.a1605551f5f51a61d20a6a5bfdfda370.exe File created C:\PROGRA~3\Mozilla\fjgblbm.dll dhuqaed.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2880 NEAS.a1605551f5f51a61d20a6a5bfdfda370.exe 2372 dhuqaed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2372 2456 taskeng.exe 29 PID 2456 wrote to memory of 2372 2456 taskeng.exe 29 PID 2456 wrote to memory of 2372 2456 taskeng.exe 29 PID 2456 wrote to memory of 2372 2456 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a1605551f5f51a61d20a6a5bfdfda370.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a1605551f5f51a61d20a6a5bfdfda370.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2880
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A9431A3-B0D7-4819-8841-61887CF8CFB3} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\PROGRA~3\Mozilla\dhuqaed.exeC:\PROGRA~3\Mozilla\dhuqaed.exe -vpwggce2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD51a871cf0dac2adc6e5c59f4e00d6a93e
SHA107c047988dcd3f7ad3eb2c70470926bb0f76a8b8
SHA25693303d93350ae85ad9cb90ce51445d66654d5f9e252b83d4434469f0599d79f8
SHA512c0554c1eaf8775f33e978e6da774c89a4c40b6332432fb3d64290365c43f0d9e550603deb0d16f2f94e1e0b92ddf6c6059cf4b46f00d7205ab9aeda14a12d84c
-
Filesize
206KB
MD51a871cf0dac2adc6e5c59f4e00d6a93e
SHA107c047988dcd3f7ad3eb2c70470926bb0f76a8b8
SHA25693303d93350ae85ad9cb90ce51445d66654d5f9e252b83d4434469f0599d79f8
SHA512c0554c1eaf8775f33e978e6da774c89a4c40b6332432fb3d64290365c43f0d9e550603deb0d16f2f94e1e0b92ddf6c6059cf4b46f00d7205ab9aeda14a12d84c