Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6fbb9f08304493011c5f575281a17200.exe
Resource
win7-20231020-en
General
-
Target
NEAS.6fbb9f08304493011c5f575281a17200.exe
-
Size
77KB
-
MD5
6fbb9f08304493011c5f575281a17200
-
SHA1
bcb7cdfd873dec0827f9436cfeb9e21e8af69468
-
SHA256
b495a933d917284d9f35f1a013d9717c20a55bcea142ae03de6790071f0ea3d4
-
SHA512
92d59a578e3846c8db686ab07f76c575916fddbe978428b51d8c199b271a7c289a703d1b1a0ed3e94b6316c75fc50b57c71eb0d788fa55ef6aa10dcb978395b4
-
SSDEEP
1536:zxKyhnAUfUiZR9G84qk+Be/HZ17hmZp2t:zLCEZTGx518E
Malware Config
Extracted
urelas
218.54.28.139
121.88.5.183
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2888 poldge.exe -
Loads dropped DLL 1 IoCs
pid Process 2144 NEAS.6fbb9f08304493011c5f575281a17200.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2888 2144 NEAS.6fbb9f08304493011c5f575281a17200.exe 28 PID 2144 wrote to memory of 2888 2144 NEAS.6fbb9f08304493011c5f575281a17200.exe 28 PID 2144 wrote to memory of 2888 2144 NEAS.6fbb9f08304493011c5f575281a17200.exe 28 PID 2144 wrote to memory of 2888 2144 NEAS.6fbb9f08304493011c5f575281a17200.exe 28 PID 2144 wrote to memory of 2676 2144 NEAS.6fbb9f08304493011c5f575281a17200.exe 29 PID 2144 wrote to memory of 2676 2144 NEAS.6fbb9f08304493011c5f575281a17200.exe 29 PID 2144 wrote to memory of 2676 2144 NEAS.6fbb9f08304493011c5f575281a17200.exe 29 PID 2144 wrote to memory of 2676 2144 NEAS.6fbb9f08304493011c5f575281a17200.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6fbb9f08304493011c5f575281a17200.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6fbb9f08304493011c5f575281a17200.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\poldge.exe"C:\Users\Admin\AppData\Local\Temp\poldge.exe"2⤵
- Executes dropped EXE
PID:2888
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5af6f90fee60d60070d9076eba7533c76
SHA1015da84cb0cfce8699e8b1937dfac54a15e7e792
SHA25614360d90f621ef9e1d84b269de67f782c9f6a904cf3226c2724d4898c157b687
SHA51253ce60ef6f9dc9241d106d4e160833430e7855a221babf9835578096313a7a8ba1285df8d5620850ffe9f41f860e04e758a2f0be6fe688a87ea13d780234c3dc
-
Filesize
77KB
MD5f4c49e27cf11481a022a7b114fe2eb9b
SHA14f4a2766337f030a270a5310c9194bf4a63085ec
SHA25636275ca356a8124eee4083d3104f67d62510ec8efcee9ae70a4c564982d07925
SHA5127c0db411e192fa1e6a7c455db6abfa17fb70e1d7d372681bb535a27154e1743478be99149fa1b9160b34c762df8772c49d8d75cfa1ba55a2408a2d9c7f66da23
-
Filesize
284B
MD5253b224b4b890a6141588c3af279b4cd
SHA12b03fb0f093da8899a4792dec24524d6ef48d47c
SHA2567a32edda7451cca0ead58782ed1938581f697044c3b920edd631e8c3ec96dc83
SHA512359bcdb083bfbe4ff4a47be406fc6ba6c9e36e452e646d4b4783ecb327fc1c8599ca44e0b33ce054a5b3f5f5c92d61e6f944479c9e3965b3ac4e5558fa0afcc3
-
Filesize
284B
MD5253b224b4b890a6141588c3af279b4cd
SHA12b03fb0f093da8899a4792dec24524d6ef48d47c
SHA2567a32edda7451cca0ead58782ed1938581f697044c3b920edd631e8c3ec96dc83
SHA512359bcdb083bfbe4ff4a47be406fc6ba6c9e36e452e646d4b4783ecb327fc1c8599ca44e0b33ce054a5b3f5f5c92d61e6f944479c9e3965b3ac4e5558fa0afcc3
-
Filesize
77KB
MD5f4c49e27cf11481a022a7b114fe2eb9b
SHA14f4a2766337f030a270a5310c9194bf4a63085ec
SHA25636275ca356a8124eee4083d3104f67d62510ec8efcee9ae70a4c564982d07925
SHA5127c0db411e192fa1e6a7c455db6abfa17fb70e1d7d372681bb535a27154e1743478be99149fa1b9160b34c762df8772c49d8d75cfa1ba55a2408a2d9c7f66da23