Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
04/11/2023, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.03a787f6865d3e4eda3feb9c9e551470.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.03a787f6865d3e4eda3feb9c9e551470.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.03a787f6865d3e4eda3feb9c9e551470.exe
-
Size
932KB
-
MD5
03a787f6865d3e4eda3feb9c9e551470
-
SHA1
59541b4cc01f40c2804ec64e145ca1bec0f8da19
-
SHA256
1a80e249ff1e154bb002028e4fe0248ea26cb8833ab8cca97798c4dd80ecdca3
-
SHA512
6a41aaa3fcce4a6cf3ad9badb6ce4a7f3710280ccfbebf0ff2631a30458a9c79da10c8c197d3ce04f998b37433563b2a49b3ea66f3e601fc7c475990f5d6f4ed
-
SSDEEP
12288:P1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdCt+nNxzKrqu:P1/aGLDCM4D8ayGMZo8/+t+FW5lKLw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 uofae.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 NEAS.03a787f6865d3e4eda3feb9c9e551470.exe 2192 NEAS.03a787f6865d3e4eda3feb9c9e551470.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\uofae.exe" uofae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2684 2192 NEAS.03a787f6865d3e4eda3feb9c9e551470.exe 27 PID 2192 wrote to memory of 2684 2192 NEAS.03a787f6865d3e4eda3feb9c9e551470.exe 27 PID 2192 wrote to memory of 2684 2192 NEAS.03a787f6865d3e4eda3feb9c9e551470.exe 27 PID 2192 wrote to memory of 2684 2192 NEAS.03a787f6865d3e4eda3feb9c9e551470.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.03a787f6865d3e4eda3feb9c9e551470.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.03a787f6865d3e4eda3feb9c9e551470.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\ProgramData\uofae.exe"C:\ProgramData\uofae.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD5548b6d43a4bec6b96f8749de6d0cc459
SHA1a9328b2a3ee002dd40603ac25ca78280cfa88f41
SHA2568bd64645f009efa380b447c046cb6e5f65020b41e18f7d9c9f9dd1444f5ed823
SHA51289e63de1823476bb4a5440fee917416dc3b56176993089ddaf7fd7c68d0e9da16a63be81c3b624e8b8a574ba1e1d7e767ae39d119bd01aded67460b80723a17e
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
454KB
MD57cced8bbeffa047bb495c0f21e9bfe69
SHA1084e58c5c7b39acdca977f05733459829eb2c9e2
SHA256e5b4bcd5ad98116b05e46bd4c970052929c77d834871eec7d381589453cc5bd0
SHA51228feea83ba5a13512e0356239041fc6418970b4b9954f8282e5ab609665fe774f6e301d6b5eccb8399b73bd53c9cbdbe90cf82ed0db6b85eb47f1472f1664667
-
Filesize
454KB
MD57cced8bbeffa047bb495c0f21e9bfe69
SHA1084e58c5c7b39acdca977f05733459829eb2c9e2
SHA256e5b4bcd5ad98116b05e46bd4c970052929c77d834871eec7d381589453cc5bd0
SHA51228feea83ba5a13512e0356239041fc6418970b4b9954f8282e5ab609665fe774f6e301d6b5eccb8399b73bd53c9cbdbe90cf82ed0db6b85eb47f1472f1664667
-
Filesize
454KB
MD57cced8bbeffa047bb495c0f21e9bfe69
SHA1084e58c5c7b39acdca977f05733459829eb2c9e2
SHA256e5b4bcd5ad98116b05e46bd4c970052929c77d834871eec7d381589453cc5bd0
SHA51228feea83ba5a13512e0356239041fc6418970b4b9954f8282e5ab609665fe774f6e301d6b5eccb8399b73bd53c9cbdbe90cf82ed0db6b85eb47f1472f1664667
-
Filesize
454KB
MD57cced8bbeffa047bb495c0f21e9bfe69
SHA1084e58c5c7b39acdca977f05733459829eb2c9e2
SHA256e5b4bcd5ad98116b05e46bd4c970052929c77d834871eec7d381589453cc5bd0
SHA51228feea83ba5a13512e0356239041fc6418970b4b9954f8282e5ab609665fe774f6e301d6b5eccb8399b73bd53c9cbdbe90cf82ed0db6b85eb47f1472f1664667
-
Filesize
454KB
MD57cced8bbeffa047bb495c0f21e9bfe69
SHA1084e58c5c7b39acdca977f05733459829eb2c9e2
SHA256e5b4bcd5ad98116b05e46bd4c970052929c77d834871eec7d381589453cc5bd0
SHA51228feea83ba5a13512e0356239041fc6418970b4b9954f8282e5ab609665fe774f6e301d6b5eccb8399b73bd53c9cbdbe90cf82ed0db6b85eb47f1472f1664667