Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7319543191e98b9e2b380d0557b9a5e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.7319543191e98b9e2b380d0557b9a5e0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.7319543191e98b9e2b380d0557b9a5e0.exe
-
Size
200KB
-
MD5
7319543191e98b9e2b380d0557b9a5e0
-
SHA1
14ac8cc014a4f82db77372bb2574a285d4ebf188
-
SHA256
e2e93a3d1445513c1f37e8a327decdac114fc9885ad06754814c66610d119403
-
SHA512
01e7f3fbd96af8a1ab428bfdf99c2419ff4cc39e23c0486c3a1047c17ffda232c2fb224303cff867bef2be453e500aa377bc5a804a9b29962a6548b54695821f
-
SSDEEP
6144:Sghc69v5a1mG8KfchsZ9B3zYl1WGYYG1B7u:Nhc69i8KRZ9ZzYlk4G1BC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1448 NEAS.7319543191e98b9e2b380d0557b9a5e0.exe -
Loads dropped DLL 1 IoCs
pid Process 1744 NEAS.7319543191e98b9e2b380d0557b9a5e0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1744 NEAS.7319543191e98b9e2b380d0557b9a5e0.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1448 NEAS.7319543191e98b9e2b380d0557b9a5e0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1448 1744 NEAS.7319543191e98b9e2b380d0557b9a5e0.exe 29 PID 1744 wrote to memory of 1448 1744 NEAS.7319543191e98b9e2b380d0557b9a5e0.exe 29 PID 1744 wrote to memory of 1448 1744 NEAS.7319543191e98b9e2b380d0557b9a5e0.exe 29 PID 1744 wrote to memory of 1448 1744 NEAS.7319543191e98b9e2b380d0557b9a5e0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7319543191e98b9e2b380d0557b9a5e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7319543191e98b9e2b380d0557b9a5e0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\NEAS.7319543191e98b9e2b380d0557b9a5e0.exeC:\Users\Admin\AppData\Local\Temp\NEAS.7319543191e98b9e2b380d0557b9a5e0.exe2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1448
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5fdfa716fe6f0c4cd4df119d57e9f3995
SHA18479f9b7df46c345c18737ca405dc2f2d3ebe600
SHA256f3262c918a58e3fd2553036159a6e83ded3dce664f4245d0df70028b3ad0d754
SHA512d1fa7785cf84d2d9216f95c76d69e3f941a56dac0d7c0957ceabd8a02b6be010ab0f25cf62fd9276831cba38f23e64780143f6becf4db08d82c90844ab988903
-
Filesize
200KB
MD5fdfa716fe6f0c4cd4df119d57e9f3995
SHA18479f9b7df46c345c18737ca405dc2f2d3ebe600
SHA256f3262c918a58e3fd2553036159a6e83ded3dce664f4245d0df70028b3ad0d754
SHA512d1fa7785cf84d2d9216f95c76d69e3f941a56dac0d7c0957ceabd8a02b6be010ab0f25cf62fd9276831cba38f23e64780143f6becf4db08d82c90844ab988903