Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.35b06e4fb26d65a19768a3a424e4bbe0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.35b06e4fb26d65a19768a3a424e4bbe0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.35b06e4fb26d65a19768a3a424e4bbe0_JC.exe
-
Size
107KB
-
MD5
35b06e4fb26d65a19768a3a424e4bbe0
-
SHA1
dee4edcc6990b062b0275c38efcb848e2c97803a
-
SHA256
21b11aafabeae101c2478cf98ca2da2859feaee76bc775479b5fb6a0ab11a167
-
SHA512
d9e87c95b2a36e8313f9b4d92fa31deb5c7a810329db1af5e9393c14d375252f95f84df8a6638a7817d67366234f85c77f013a33eda861c9aa7e87a0b8141af9
-
SSDEEP
3072:i+Oa8AFGusZI5e+Mp+BC3K5eqU+BC3K5eqYro+x:NIAFG3IaDK70K7qx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1592 gpypjxc.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\gpypjxc.exe NEAS.35b06e4fb26d65a19768a3a424e4bbe0_JC.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3180 1592 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1592 gpypjxc.exe 1592 gpypjxc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1592 gpypjxc.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3192 1592 gpypjxc.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\NEAS.35b06e4fb26d65a19768a3a424e4bbe0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.35b06e4fb26d65a19768a3a424e4bbe0_JC.exe"2⤵
- Drops file in Program Files directory
PID:60
-
-
C:\PROGRA~3\Mozilla\gpypjxc.exeC:\PROGRA~3\Mozilla\gpypjxc.exe -tripsff1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 5042⤵
- Program crash
PID:3180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1592 -ip 15921⤵PID:1744
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5aca14d0a9186503eaf3501fd5c877606
SHA15ce1ace3284a13c9400aa8c1a46c06beb75147be
SHA256ad3c8a8eb1dbc63c4b10332df93812282f7054cdb5e636a207a6ba39107597bc
SHA512cfba4adfb3a93864c581840aa8aefca2da79fb8e1927bfb892bf417730bd79192e370e4f494f767636aeb0a5c7a66194efd061b7f9a182d00e037a20d2cfba95
-
Filesize
107KB
MD5aca14d0a9186503eaf3501fd5c877606
SHA15ce1ace3284a13c9400aa8c1a46c06beb75147be
SHA256ad3c8a8eb1dbc63c4b10332df93812282f7054cdb5e636a207a6ba39107597bc
SHA512cfba4adfb3a93864c581840aa8aefca2da79fb8e1927bfb892bf417730bd79192e370e4f494f767636aeb0a5c7a66194efd061b7f9a182d00e037a20d2cfba95