Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe
-
Size
37KB
-
MD5
984bc6d2a8cc4fc1ae000febc256a0e0
-
SHA1
321bbaf9c5b1616c4dc17d53e8635505a48ea826
-
SHA256
55b2b20da349f3c1edf20edb6707bf4cc4ac09d56c5bac115846fb05df64da8b
-
SHA512
21c2b3abb5ad87bd865370810161253f58d65140297ac97665062fe2652ecba54dcdc3441b96207e3cb2b4b5be2797daf4c4487b8747c6f4050156c583746701
-
SSDEEP
768:AzCzDHjqcg3fwgpYK/k59zck/fDBmaXjWDr/1J5TXtoKhDyC:fM3fiXjWv/1J5TXyKVyC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2336 plote.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2496 NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe 2336 plote.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2336 2496 NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe 28 PID 2496 wrote to memory of 2336 2496 NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe 28 PID 2496 wrote to memory of 2336 2496 NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe 28 PID 2496 wrote to memory of 2336 2496 NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.984bc6d2a8cc4fc1ae000febc256a0e0.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\plote.exe"C:\Users\Admin\AppData\Local\Temp\plote.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD547590002b84b75f3abf92957654d4072
SHA1bc6cdb3e3d5932fcefa3c323f368743132f52295
SHA256da83c129875697c518c7ef04a9fd56462b23fb9949bfcedad96cbd27b41428ec
SHA512e47d35ecafc168142999671c28fcf3d571c70fedfea2da21a66bbeb32564386ac24984ee8f35094156639debb32fd53a8b2625964e693982cf96ceb72cbbab63
-
Filesize
37KB
MD547590002b84b75f3abf92957654d4072
SHA1bc6cdb3e3d5932fcefa3c323f368743132f52295
SHA256da83c129875697c518c7ef04a9fd56462b23fb9949bfcedad96cbd27b41428ec
SHA512e47d35ecafc168142999671c28fcf3d571c70fedfea2da21a66bbeb32564386ac24984ee8f35094156639debb32fd53a8b2625964e693982cf96ceb72cbbab63
-
Filesize
37KB
MD547590002b84b75f3abf92957654d4072
SHA1bc6cdb3e3d5932fcefa3c323f368743132f52295
SHA256da83c129875697c518c7ef04a9fd56462b23fb9949bfcedad96cbd27b41428ec
SHA512e47d35ecafc168142999671c28fcf3d571c70fedfea2da21a66bbeb32564386ac24984ee8f35094156639debb32fd53a8b2625964e693982cf96ceb72cbbab63