Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 16:35
Behavioral task
behavioral1
Sample
NEAS.045848ae3096362920d4a701b216bd30_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.045848ae3096362920d4a701b216bd30_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.045848ae3096362920d4a701b216bd30_JC.exe
-
Size
720KB
-
MD5
045848ae3096362920d4a701b216bd30
-
SHA1
955b04eba6c60c3573e3c557c9725cfdb5c23dce
-
SHA256
4661ac1cd1649de19baa27c5434965705b97b3f6d57e4c72b6db703749fa6c40
-
SHA512
809a73dd36cdf436ec0bf02a388b63d86e890f5665ad0f9f37a6e82aa90b052732685a38ee07f681361e9a7d8942b9e3be029cf9edb8ba4a446290171cf2e894
-
SSDEEP
12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi754:arl6kD68JmloO7TdNaPymUi63i62xHLE
Malware Config
Extracted
azorult
http://185.79.156.23/j0n0/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
resource yara_rule behavioral1/memory/1456-0-0x0000000000090000-0x0000000000224000-memory.dmp upx behavioral1/memory/1456-25-0x0000000000090000-0x0000000000224000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1456-25-0x0000000000090000-0x0000000000224000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2876 timeout.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 PID 1456 wrote to memory of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 PID 1456 wrote to memory of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 PID 1456 wrote to memory of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 PID 1456 wrote to memory of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 PID 1456 wrote to memory of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 PID 1456 wrote to memory of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 PID 1456 wrote to memory of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 PID 1456 wrote to memory of 2388 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 28 PID 1456 wrote to memory of 2652 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 29 PID 1456 wrote to memory of 2652 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 29 PID 1456 wrote to memory of 2652 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 29 PID 1456 wrote to memory of 2652 1456 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 29 PID 2652 wrote to memory of 2876 2652 cmd.exe 31 PID 2652 wrote to memory of 2876 2652 cmd.exe 31 PID 2652 wrote to memory of 2876 2652 cmd.exe 31 PID 2652 wrote to memory of 2876 2652 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.045848ae3096362920d4a701b216bd30_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.045848ae3096362920d4a701b216bd30_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:2388
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\Admin\AppData\Local\Temp\NEAS.045848ae3096362920d4a701b216bd30_JC.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\timeout.exeTimeOut 13⤵
- Delays execution with timeout.exe
PID:2876
-
-