Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.dcb8b38d1dc0cc7c4b38acf020195ec0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.dcb8b38d1dc0cc7c4b38acf020195ec0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.dcb8b38d1dc0cc7c4b38acf020195ec0.exe
-
Size
195KB
-
MD5
dcb8b38d1dc0cc7c4b38acf020195ec0
-
SHA1
40ff738a04a16dd1f00270b75e726eaea743e6f8
-
SHA256
a6d19b5da9e8ec9e8c91b11a84e9a2a5fade09a0c88e8ea599d3a0c2a90d085f
-
SHA512
106f27ab56bf4d14deac18e2cc066d5d0228ecea04e2072d3e38764cf68b89bcd614dfcf7f2b355f7fe2a1da506081cc343a0b75bdc142eda4306f1cc950bcd3
-
SSDEEP
3072:7mLy5XClqNrbPY4oLonnMXZKdujCa5BQbXHQSOydRmTgpZWYS2jbxWGqJslN:7w2ylq+b8nnUKAQbXHN1gWXSbGqJwN
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2732 dhuqaed.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dhuqaed.exe NEAS.dcb8b38d1dc0cc7c4b38acf020195ec0.exe File created C:\PROGRA~3\Mozilla\fjgblbm.dll dhuqaed.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2040 NEAS.dcb8b38d1dc0cc7c4b38acf020195ec0.exe 2732 dhuqaed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2732 2476 taskeng.exe 31 PID 2476 wrote to memory of 2732 2476 taskeng.exe 31 PID 2476 wrote to memory of 2732 2476 taskeng.exe 31 PID 2476 wrote to memory of 2732 2476 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.dcb8b38d1dc0cc7c4b38acf020195ec0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.dcb8b38d1dc0cc7c4b38acf020195ec0.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2040
-
C:\Windows\system32\taskeng.exetaskeng.exe {DC0733A2-87D8-431F-8958-655F7B00B5C9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\PROGRA~3\Mozilla\dhuqaed.exeC:\PROGRA~3\Mozilla\dhuqaed.exe -vpwggce2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD502a4153696fed8f2a53830daa2e75be6
SHA12fbbb294ee5e737a602790a198ecb31382157854
SHA256d9f23f73e3ed8fcccaa824b3b7e8eeb2073e77aac8a0303c59a160964fc90a29
SHA512c2c428460a724d60a4669dd4bd6a8b7b2d59ead924518b176046dd1af8418b397ec9c47337e2001ac939369b5fdc61562533e3b176dcab0999d8524356368f04
-
Filesize
195KB
MD502a4153696fed8f2a53830daa2e75be6
SHA12fbbb294ee5e737a602790a198ecb31382157854
SHA256d9f23f73e3ed8fcccaa824b3b7e8eeb2073e77aac8a0303c59a160964fc90a29
SHA512c2c428460a724d60a4669dd4bd6a8b7b2d59ead924518b176046dd1af8418b397ec9c47337e2001ac939369b5fdc61562533e3b176dcab0999d8524356368f04