Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2023, 02:44

General

  • Target

    NEAS.0461c66b46640823d38b5112983cae60_JC.exe

  • Size

    391KB

  • MD5

    0461c66b46640823d38b5112983cae60

  • SHA1

    85c86bb98e905114923e1ce11305a0d2a715da65

  • SHA256

    978362229a73d703cf6d3536e09abec9a518d0916b1ceac0bba03c468495e31c

  • SHA512

    727ef35c8c951495b342587a49ae16cdd5deaa6e398ed572cd3c2c6a7e5239622c993d121ba0a88bda08894024b84b9cfff6ff27e89e402e1f3d70a9775aba5a

  • SSDEEP

    6144:0Gyw99vtxI7XzzQoRXdla8To8maHHko/9FsHbtR28mI1dY0:w4vt6bXQoRXdlHToQnl9OH2NID

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0461c66b46640823d38b5112983cae60_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0461c66b46640823d38b5112983cae60_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gfd319B.tmp

    Filesize

    264KB

    MD5

    b795e14dcb8b6f9f79c459c033cc5218

    SHA1

    337d7e4d738dcfc54bda89c76857d834b4fc937a

    SHA256

    6f952d44fef31c1ea27ec812a6102dda47529a9c14589ca36e6d27f67565d905

    SHA512

    d93b1d3b5351f97b0af91589378f9b4733efb13510531cdd58936f8bd0bdc4d8ad9a613dea3a023d77e516dca40fe87e729346fd7825e0e30ab71a8dcf665e4f

  • \Users\Admin\AppData\Local\Temp\gfd319B.tmp

    Filesize

    264KB

    MD5

    b795e14dcb8b6f9f79c459c033cc5218

    SHA1

    337d7e4d738dcfc54bda89c76857d834b4fc937a

    SHA256

    6f952d44fef31c1ea27ec812a6102dda47529a9c14589ca36e6d27f67565d905

    SHA512

    d93b1d3b5351f97b0af91589378f9b4733efb13510531cdd58936f8bd0bdc4d8ad9a613dea3a023d77e516dca40fe87e729346fd7825e0e30ab71a8dcf665e4f

  • memory/2936-3-0x0000000074E20000-0x000000007550E000-memory.dmp

    Filesize

    6.9MB

  • memory/2936-2-0x0000000000360000-0x00000000003A6000-memory.dmp

    Filesize

    280KB

  • memory/2936-4-0x0000000004C40000-0x0000000004C80000-memory.dmp

    Filesize

    256KB

  • memory/2936-5-0x0000000004C40000-0x0000000004C80000-memory.dmp

    Filesize

    256KB

  • memory/2936-6-0x0000000004C40000-0x0000000004C80000-memory.dmp

    Filesize

    256KB

  • memory/2936-11-0x000000000A630000-0x000000000ADD6000-memory.dmp

    Filesize

    7.6MB

  • memory/2936-17-0x0000000074E20000-0x000000007550E000-memory.dmp

    Filesize

    6.9MB

  • memory/2936-18-0x0000000004C40000-0x0000000004C80000-memory.dmp

    Filesize

    256KB