Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e6f8662ec51d3cbb4e4a117d8610ca10.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.e6f8662ec51d3cbb4e4a117d8610ca10.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.e6f8662ec51d3cbb4e4a117d8610ca10.exe
-
Size
145KB
-
MD5
e6f8662ec51d3cbb4e4a117d8610ca10
-
SHA1
b0dd1620124782c6a36baa4057a3185f9e537571
-
SHA256
3dec6c0d6e771b05006f99bd9ba599b820b87c4f186d45c8a4db077d324e8859
-
SHA512
ef59631e95a129220481da4c7a3a43422f83924dbc0dbcdfaeadcfdcca6c7f580ba3530b47d7aa9d25bc234847a2df1ca62f16be51ade3b7e932a074b214095e
-
SSDEEP
3072:+apQLsjnOYOKOpGQ2ly+4yHyisr7O8CMFPv3yJDUKb80vh:+aIsfQ28+4R7T5vrsXh
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2124 ajahmjj.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ajahmjj.exe NEAS.e6f8662ec51d3cbb4e4a117d8610ca10.exe File created C:\PROGRA~3\Mozilla\ghzyxbm.dll ajahmjj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2124 2344 taskeng.exe 28 PID 2344 wrote to memory of 2124 2344 taskeng.exe 28 PID 2344 wrote to memory of 2124 2344 taskeng.exe 28 PID 2344 wrote to memory of 2124 2344 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e6f8662ec51d3cbb4e4a117d8610ca10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e6f8662ec51d3cbb4e4a117d8610ca10.exe"1⤵
- Drops file in Program Files directory
PID:2208
-
C:\Windows\system32\taskeng.exetaskeng.exe {521045CB-5053-48EA-B630-858C4972A3D9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\PROGRA~3\Mozilla\ajahmjj.exeC:\PROGRA~3\Mozilla\ajahmjj.exe -mngyzad2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5eb1df2fb9c3b655b3c646586f7243b5f
SHA149c7a988012661dfc5ec18f09fe0009206e62bce
SHA2562faadd980fcaef1797a73069764d7c56c660e845ac8b382799d1e173ad97b8f0
SHA512bd23f280242dc003b9d10c5857dda5241f82173189474fb1e0df27fca25b17b9ba240a0710714e598c4856aab29b36c4d57efd636271fcb0402987a3ad56bf9d
-
Filesize
145KB
MD5eb1df2fb9c3b655b3c646586f7243b5f
SHA149c7a988012661dfc5ec18f09fe0009206e62bce
SHA2562faadd980fcaef1797a73069764d7c56c660e845ac8b382799d1e173ad97b8f0
SHA512bd23f280242dc003b9d10c5857dda5241f82173189474fb1e0df27fca25b17b9ba240a0710714e598c4856aab29b36c4d57efd636271fcb0402987a3ad56bf9d