Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 15:39
Behavioral task
behavioral1
Sample
NEAS.f4b90e1ceaa1c88458604f34205b55f5cc7bbd11dc9da6e5fb0b2dd20215774a.dll
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.f4b90e1ceaa1c88458604f34205b55f5cc7bbd11dc9da6e5fb0b2dd20215774a.dll
Resource
win10v2004-20231023-en
General
-
Target
NEAS.f4b90e1ceaa1c88458604f34205b55f5cc7bbd11dc9da6e5fb0b2dd20215774a.dll
-
Size
275KB
-
MD5
5ba487dee668508c9f96acda32c5d84c
-
SHA1
02a6f24bf056fc8c10200c3a85bc56cf12d9b7dd
-
SHA256
f4b90e1ceaa1c88458604f34205b55f5cc7bbd11dc9da6e5fb0b2dd20215774a
-
SHA512
4bfe6182e3275a4cede4be5c838de299504c95c28d603fb32db4ebdabad8d827055a2e8709204a801fb66420811b881663e11080da036bc79b9b67173cda5111
-
SSDEEP
6144:+RR5rhZFQGrsUwF7vlPoSyHAV2A+lPM6u:+R5nWFpPoSKu
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4708-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4708-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4708-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4708-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4708-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4708-5-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 4244 4708 WerFault.exe 87 2148 4708 WerFault.exe 87 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4708 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2060 wrote to memory of 4708 2060 rundll32.exe 87 PID 2060 wrote to memory of 4708 2060 rundll32.exe 87 PID 2060 wrote to memory of 4708 2060 rundll32.exe 87 PID 4708 wrote to memory of 4244 4708 rundll32.exe 96 PID 4708 wrote to memory of 4244 4708 rundll32.exe 96 PID 4708 wrote to memory of 4244 4708 rundll32.exe 96
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.f4b90e1ceaa1c88458604f34205b55f5cc7bbd11dc9da6e5fb0b2dd20215774a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.f4b90e1ceaa1c88458604f34205b55f5cc7bbd11dc9da6e5fb0b2dd20215774a.dll,#12⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 6443⤵
- Program crash
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 6443⤵
- Program crash
PID:2148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4708 -ip 47081⤵PID:4680