Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.28d5db283e5833f98e2aea4badcf2490.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.28d5db283e5833f98e2aea4badcf2490.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.28d5db283e5833f98e2aea4badcf2490.exe
-
Size
38KB
-
MD5
28d5db283e5833f98e2aea4badcf2490
-
SHA1
0ce13c2b6c4c6b6988ff7d486523fece6e9d811d
-
SHA256
30c7091c6dff76a77eed0c53d6fc7464b763020eb9892e85fe6819e65f1c03e0
-
SHA512
401b9e28dcaf9f6dac5ab2d43e7519fa366b5de22ba25e79d6f8fad76428933c8c7286e583f3dc3c47342f0b4f787887c641bf7f35646bf80daa46282d41975a
-
SSDEEP
768:agwpLIesy68Q3+dotaqCKLeDNajYpxS632z3Ck7Z5NF8:OpFsCdKfCKLjYpxWr7Na
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1924 ygczw.exe -
Loads dropped DLL 1 IoCs
pid Process 3004 NEAS.28d5db283e5833f98e2aea4badcf2490.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3004 NEAS.28d5db283e5833f98e2aea4badcf2490.exe 1924 ygczw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1924 3004 NEAS.28d5db283e5833f98e2aea4badcf2490.exe 28 PID 3004 wrote to memory of 1924 3004 NEAS.28d5db283e5833f98e2aea4badcf2490.exe 28 PID 3004 wrote to memory of 1924 3004 NEAS.28d5db283e5833f98e2aea4badcf2490.exe 28 PID 3004 wrote to memory of 1924 3004 NEAS.28d5db283e5833f98e2aea4badcf2490.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.28d5db283e5833f98e2aea4badcf2490.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.28d5db283e5833f98e2aea4badcf2490.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\ygczw.exe"C:\Users\Admin\AppData\Local\Temp\ygczw.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD558478ed57da24c2af069718ce93c6d82
SHA1ddfac3f8e141df5b06a6b4f8b76e1a112d2e5ea4
SHA2565073a3abc0ccea5f2f40b569b7c9715c87dbe04f7021a3ad875f44111d713dda
SHA512ac81d02fe2d69c8c4868b87ecf0031ac4d8a1f80a1a90dede308513a1ed43484150f5a9203665f46a10db831c2cdaf2d5d7ac4f32db9c7628416bb07e3c8e339
-
Filesize
38KB
MD558478ed57da24c2af069718ce93c6d82
SHA1ddfac3f8e141df5b06a6b4f8b76e1a112d2e5ea4
SHA2565073a3abc0ccea5f2f40b569b7c9715c87dbe04f7021a3ad875f44111d713dda
SHA512ac81d02fe2d69c8c4868b87ecf0031ac4d8a1f80a1a90dede308513a1ed43484150f5a9203665f46a10db831c2cdaf2d5d7ac4f32db9c7628416bb07e3c8e339
-
Filesize
38KB
MD558478ed57da24c2af069718ce93c6d82
SHA1ddfac3f8e141df5b06a6b4f8b76e1a112d2e5ea4
SHA2565073a3abc0ccea5f2f40b569b7c9715c87dbe04f7021a3ad875f44111d713dda
SHA512ac81d02fe2d69c8c4868b87ecf0031ac4d8a1f80a1a90dede308513a1ed43484150f5a9203665f46a10db831c2cdaf2d5d7ac4f32db9c7628416bb07e3c8e339