Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
04/11/2023, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe
-
Size
1.0MB
-
MD5
4af88ea026da3d82dcea879ec94b7d10
-
SHA1
7f5dc51f408d921aa0f5e36643f51b51a487639a
-
SHA256
9c2e03316821804c8f21dda28c1bd2c93a7539133ded5af5e9b307cd2fc7b0d6
-
SHA512
068bf1f9f0131aecf8b6a2b9253aaefdd8233d959ac20b5c27c86883c81987b7a2802a33da9035d69af3380a8e09e89b4cea654f4a8a90cde54eedccb018c74b
-
SSDEEP
24576:rKfQR1QpusQ/WJDaS5LbZKmUXubhEOLvpv5xV02zqByyXd3YE:rKfQR1iWWMCLblJbP1HV0F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3048 shfill.exe -
Loads dropped DLL 3 IoCs
pid Process 844 NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe 844 NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe 3048 shfill.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\shfill.INI shfill.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3048 shfill.exe 3048 shfill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 844 wrote to memory of 3048 844 NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe 28 PID 844 wrote to memory of 3048 844 NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe 28 PID 844 wrote to memory of 3048 844 NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe 28 PID 844 wrote to memory of 3048 844 NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe 28 PID 3048 wrote to memory of 2448 3048 shfill.exe 29 PID 3048 wrote to memory of 2448 3048 shfill.exe 29 PID 3048 wrote to memory of 2448 3048 shfill.exe 29 PID 3048 wrote to memory of 2448 3048 shfill.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\ShF64CB.tmp\shfill.exeC:\Users\Admin\AppData\Local\Temp\ShF64CB.tmp\shfill.exe form.ftf "C:\Users\Admin\AppData\Local\Temp\NEAS.4af88ea026da3d82dcea879ec94b7d10_JC.exe" Form.fdd2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD51e6564a600b7cfea93f0684aa6188f2e
SHA1c8027fa5e4ccf0dc50171351bf0bed78da70727b
SHA256862ab277a7b83265df7c9875256240dd61feb27799d07f8cd48307bb3a79ea29
SHA51279f29a17c5a34369c0d80997d9af380d7fd44f19018ff564f7400c3141adab8be7af20a34cf158301d364c083c4e3a696d50cbfefe79cb7d328c7c750db706b6
-
Filesize
1KB
MD57aff3e768acd60511287e484510c73a5
SHA1ee4544c35751ef3c27d904d2a23fabc862f3079b
SHA256fac69f69bdacc10248e7c76f6f094b9c92ee0cf086ac802c1765ba72f529cb20
SHA51213839ca2f1462725668a3f2a50495a6e21940d9ca8279243baa1e4395ff55bf88324b556002ed0bdca414c4075f5737b6a9bb085ff21624cc77adbf2ec90ab7a
-
Filesize
1.3MB
MD5cd3a82cc3684196c11430de1d37218b3
SHA121ed2dad045f7c0880e122ca166ea3a1c6cab635
SHA256fca070de6b7e48b20211e5fe90acd8a2c329e08a359cba6f4110c720d4a196ef
SHA512861d369477811a457a60438d1e3d9798fcd79f7c95b5f472ceac32b8e3a6c52abeaf1ecfe9eb29e8b35e6dbd5995d338ff784aad7b9782086948affd1510223d
-
Filesize
1.3MB
MD5cd3a82cc3684196c11430de1d37218b3
SHA121ed2dad045f7c0880e122ca166ea3a1c6cab635
SHA256fca070de6b7e48b20211e5fe90acd8a2c329e08a359cba6f4110c720d4a196ef
SHA512861d369477811a457a60438d1e3d9798fcd79f7c95b5f472ceac32b8e3a6c52abeaf1ecfe9eb29e8b35e6dbd5995d338ff784aad7b9782086948affd1510223d
-
Filesize
46KB
MD5e7a9299bb7ed2216805040d8c3f668d9
SHA154fef28119acf0362756871f99c0cdc07109494d
SHA25618cc8d64bed8cf913510327ba30edb2d83c0f2f962e2dbd007b1388c70169b7a
SHA512ed54e4a71bfff3234fde575ec09d9eab2f539c7d1c546ab8cc9794c55f21949ed7edf114ffefc69a1c90a018b8066589052e941f4069e0cf3cce500b50a4203d
-
Filesize
151B
MD5b7f129f2a79bd6b9ec1c9620df935cd5
SHA100ebae4b62d2595305f81e97206b7069b46daf5a
SHA2562465cdea2e1e581cf9d5df3dd0bc5c85c456284906ed0bb9ae1f9510139e1140
SHA5123461bf6933fb54d380c816e9996b6cf4e580d96e82c97141fd285f17aeee45cc94410326acff91ac0a0c7850258f9f181fdfceb7c700aae7457c8b2dd41f43c1
-
Filesize
1.3MB
MD5cd3a82cc3684196c11430de1d37218b3
SHA121ed2dad045f7c0880e122ca166ea3a1c6cab635
SHA256fca070de6b7e48b20211e5fe90acd8a2c329e08a359cba6f4110c720d4a196ef
SHA512861d369477811a457a60438d1e3d9798fcd79f7c95b5f472ceac32b8e3a6c52abeaf1ecfe9eb29e8b35e6dbd5995d338ff784aad7b9782086948affd1510223d
-
Filesize
1.3MB
MD5cd3a82cc3684196c11430de1d37218b3
SHA121ed2dad045f7c0880e122ca166ea3a1c6cab635
SHA256fca070de6b7e48b20211e5fe90acd8a2c329e08a359cba6f4110c720d4a196ef
SHA512861d369477811a457a60438d1e3d9798fcd79f7c95b5f472ceac32b8e3a6c52abeaf1ecfe9eb29e8b35e6dbd5995d338ff784aad7b9782086948affd1510223d
-
Filesize
64KB
MD51e6564a600b7cfea93f0684aa6188f2e
SHA1c8027fa5e4ccf0dc50171351bf0bed78da70727b
SHA256862ab277a7b83265df7c9875256240dd61feb27799d07f8cd48307bb3a79ea29
SHA51279f29a17c5a34369c0d80997d9af380d7fd44f19018ff564f7400c3141adab8be7af20a34cf158301d364c083c4e3a696d50cbfefe79cb7d328c7c750db706b6