Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe
-
Size
736KB
-
MD5
ac8ebc20a1597b2c79e300ed217df2f0
-
SHA1
77ef37b56984ff95df96bd69563000e3150ada98
-
SHA256
619bd16df62803a060223f9590c66005e728c184ab64b73ed0c4f315293e6dea
-
SHA512
a4ab19a2f08147b074347f24c70866890947510f661ed9a74182748b74f9936bd770527bd595d0c91199bc0774f4af79bff5524fe39645d86be550246bde732a
-
SSDEEP
12288:P1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdX5rzj8jF//F:P1/aGLDCM4D8ayGMZo8/CZ//F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2488 suwda.exe -
Loads dropped DLL 2 IoCs
pid Process 2648 NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe 2648 NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\suwda.exe" suwda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2488 2648 NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe 28 PID 2648 wrote to memory of 2488 2648 NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe 28 PID 2648 wrote to memory of 2488 2648 NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe 28 PID 2648 wrote to memory of 2488 2648 NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\ProgramData\suwda.exe"C:\ProgramData\suwda.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
736KB
MD53a9416d4f6d5e72c69c4b2cc32fac9bc
SHA15ea77def595947a987097588a30708d5419c43ed
SHA256dd1cb6ec882ebe8054efe8112bf805d2c5c4eb0c3d002e1262d2650f5b35b579
SHA512ffbd523d3bc0b8315c728c7796c4ac17c7884787ce7120c14530ff69c07bf178b790dbb61b631fee44570cc03eb7bb64cf8fa3f4dcd8ca1a1ca7845f8a50ffcb
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
258KB
MD546affebd920fc7979559d93489a26384
SHA1fb860b657f2516488e858a19bbea46f05d88f05b
SHA256f363e12eb5cc474e047e695008128eb49d04198509f1e133224a733bb0f9a1ae
SHA512b39533a51bc5664f0289b264ddbf784d318b1d30a09f17f41be437a7ac1def2c105da5a8d827df165d768dac1acbb94d6f95bee8a8d55c17a1e9f0e518b589d4
-
Filesize
258KB
MD546affebd920fc7979559d93489a26384
SHA1fb860b657f2516488e858a19bbea46f05d88f05b
SHA256f363e12eb5cc474e047e695008128eb49d04198509f1e133224a733bb0f9a1ae
SHA512b39533a51bc5664f0289b264ddbf784d318b1d30a09f17f41be437a7ac1def2c105da5a8d827df165d768dac1acbb94d6f95bee8a8d55c17a1e9f0e518b589d4
-
Filesize
258KB
MD546affebd920fc7979559d93489a26384
SHA1fb860b657f2516488e858a19bbea46f05d88f05b
SHA256f363e12eb5cc474e047e695008128eb49d04198509f1e133224a733bb0f9a1ae
SHA512b39533a51bc5664f0289b264ddbf784d318b1d30a09f17f41be437a7ac1def2c105da5a8d827df165d768dac1acbb94d6f95bee8a8d55c17a1e9f0e518b589d4
-
Filesize
258KB
MD546affebd920fc7979559d93489a26384
SHA1fb860b657f2516488e858a19bbea46f05d88f05b
SHA256f363e12eb5cc474e047e695008128eb49d04198509f1e133224a733bb0f9a1ae
SHA512b39533a51bc5664f0289b264ddbf784d318b1d30a09f17f41be437a7ac1def2c105da5a8d827df165d768dac1acbb94d6f95bee8a8d55c17a1e9f0e518b589d4
-
Filesize
258KB
MD546affebd920fc7979559d93489a26384
SHA1fb860b657f2516488e858a19bbea46f05d88f05b
SHA256f363e12eb5cc474e047e695008128eb49d04198509f1e133224a733bb0f9a1ae
SHA512b39533a51bc5664f0289b264ddbf784d318b1d30a09f17f41be437a7ac1def2c105da5a8d827df165d768dac1acbb94d6f95bee8a8d55c17a1e9f0e518b589d4