Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.bdcfb446f7aba2144d2172cf22815750.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.bdcfb446f7aba2144d2172cf22815750.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.bdcfb446f7aba2144d2172cf22815750.exe
-
Size
151KB
-
MD5
bdcfb446f7aba2144d2172cf22815750
-
SHA1
9116781ddff8bbd8dc97945371850999147884ec
-
SHA256
d9dc996506d136d5f4d6fb4d31cfdceb00c126630a6f98af92785b1fae3a4d64
-
SHA512
46faa3d9cd84b52ad235bb7a37390dd7b77514bd0026e4f378fa7c35b14b01b8974b670b6867679d99e638765e709d6eaf15fc513b5b6e1a7a751fe8fadc9480
-
SSDEEP
3072:oQzrhhx9yuk/4CrNuXsNTTBm5D5LMXqNv:o6fPyH7Nu8BT4lMXqB
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2608 pwhehon.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\pwhehon.exe NEAS.bdcfb446f7aba2144d2172cf22815750.exe File created C:\PROGRA~3\Mozilla\mudzpnf.dll pwhehon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2608 2060 taskeng.exe 30 PID 2060 wrote to memory of 2608 2060 taskeng.exe 30 PID 2060 wrote to memory of 2608 2060 taskeng.exe 30 PID 2060 wrote to memory of 2608 2060 taskeng.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.bdcfb446f7aba2144d2172cf22815750.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.bdcfb446f7aba2144d2172cf22815750.exe"1⤵
- Drops file in Program Files directory
PID:2652
-
C:\Windows\system32\taskeng.exetaskeng.exe {74744E66-AB3B-48B5-9A00-E32DE53ADF9C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\PROGRA~3\Mozilla\pwhehon.exeC:\PROGRA~3\Mozilla\pwhehon.exe -arzwbsb2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD508f21a6f3c72d12b22db50e8c3147d22
SHA1ef75bff04a658f984c431c368f2b34a914fdc153
SHA256df203090d0a5eb795734bb6a8e27a2fbb2b046c2c7fb61661af486e483ef2022
SHA512141525d9fc7525523671ae40980a1c070760934a4990cddef6b218a7cd1bab13fe3c3fbab8b68fa83ca714055d946b5dc6919fa31fc83a62472b4109e0bab241
-
Filesize
151KB
MD508f21a6f3c72d12b22db50e8c3147d22
SHA1ef75bff04a658f984c431c368f2b34a914fdc153
SHA256df203090d0a5eb795734bb6a8e27a2fbb2b046c2c7fb61661af486e483ef2022
SHA512141525d9fc7525523671ae40980a1c070760934a4990cddef6b218a7cd1bab13fe3c3fbab8b68fa83ca714055d946b5dc6919fa31fc83a62472b4109e0bab241