Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe
-
Size
450KB
-
MD5
9ba6ee9339bf2fa46842d16aa4f32f40
-
SHA1
ca72126e209e0e94e4238de0ec00abdd412a2328
-
SHA256
3008ffee1c5a6be160b5cb3435b5619f82661f62c8d2917802b20e450af791f8
-
SHA512
d36a45066de313772bb65ff7df12d60e69591cd48e014c9fa51a47463b5005a962ad6ac8e987ef54f5fde7b5a30a41860f01c5011a4ce550f79da4d03599e0de
-
SSDEEP
12288:9YK7hIQ+gKrkorULq6lFfPnKX0zheI4h3Eyu8c2pfu3Eyu8c2pf:9QU+TI4SR8c4JR8c4
Malware Config
Signatures
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2620 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 dw20.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2112 1464 NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe 28 PID 1464 wrote to memory of 2112 1464 NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe 28 PID 1464 wrote to memory of 2112 1464 NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe 28 PID 2112 wrote to memory of 2620 2112 cmd.exe 30 PID 2112 wrote to memory of 2620 2112 cmd.exe 30 PID 2112 wrote to memory of 2620 2112 cmd.exe 30 PID 1464 wrote to memory of 2704 1464 NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe 31 PID 1464 wrote to memory of 2704 1464 NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe 31 PID 1464 wrote to memory of 2704 1464 NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9ba6ee9339bf2fa46842d16aa4f32f40_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\system32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:2620
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 11162⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2704
-