Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 17:23

General

  • Target

    NEAS.7471d5098b5ed288244e55d09fac9039.exe

  • Size

    108KB

  • MD5

    7471d5098b5ed288244e55d09fac9039

  • SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

  • SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

  • SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • SSDEEP

    768:qZL/0F24lercjO4sTZg5ZLvn2IuWZ0kqqNPWQHS:OLsF2Kerc64sTiX2IV0DB1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.7471d5098b5ed288244e55d09fac9039.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.7471d5098b5ed288244e55d09fac9039.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe
      "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" -r
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 2&del "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"&ping 127.0.0.1 -n 2&rename "C:\Users\Admin\AppData\Roaming\Mozilla\00001B50" WINWORD.exe&ping 127.0.0.1 -n 2&"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 2
          4⤵
          • Runs ping.exe
          PID:2832
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 2
          4⤵
          • Runs ping.exe
          PID:2676
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 2
          4⤵
          • Runs ping.exe
          PID:2428
        • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe
          "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Mozilla\00001B50

    Filesize

    108KB

    MD5

    54539869735a04f4680899257b093dad

    SHA1

    43fba3930b4c980030bb57bf23d88fce7a903ad7

    SHA256

    136ebd583563a24c3834fb42ec879d26a5136e6eb82ce653f0a93e2ceaa09c42

    SHA512

    0afa6e2cdc7b58bc7c794fe1b6bad0c6d13298c5f298fde30b87058f47cd9840c265153029f8511690237ffaaa751589bcdbf7dae54f93be53e1150c9d209fdb

  • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    7471d5098b5ed288244e55d09fac9039

    SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

    SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

    SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    7471d5098b5ed288244e55d09fac9039

    SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

    SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

    SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    7471d5098b5ed288244e55d09fac9039

    SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

    SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

    SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    54539869735a04f4680899257b093dad

    SHA1

    43fba3930b4c980030bb57bf23d88fce7a903ad7

    SHA256

    136ebd583563a24c3834fb42ec879d26a5136e6eb82ce653f0a93e2ceaa09c42

    SHA512

    0afa6e2cdc7b58bc7c794fe1b6bad0c6d13298c5f298fde30b87058f47cd9840c265153029f8511690237ffaaa751589bcdbf7dae54f93be53e1150c9d209fdb

  • \Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    7471d5098b5ed288244e55d09fac9039

    SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

    SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

    SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • \Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    7471d5098b5ed288244e55d09fac9039

    SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

    SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

    SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • \Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    54539869735a04f4680899257b093dad

    SHA1

    43fba3930b4c980030bb57bf23d88fce7a903ad7

    SHA256

    136ebd583563a24c3834fb42ec879d26a5136e6eb82ce653f0a93e2ceaa09c42

    SHA512

    0afa6e2cdc7b58bc7c794fe1b6bad0c6d13298c5f298fde30b87058f47cd9840c265153029f8511690237ffaaa751589bcdbf7dae54f93be53e1150c9d209fdb

  • \Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    54539869735a04f4680899257b093dad

    SHA1

    43fba3930b4c980030bb57bf23d88fce7a903ad7

    SHA256

    136ebd583563a24c3834fb42ec879d26a5136e6eb82ce653f0a93e2ceaa09c42

    SHA512

    0afa6e2cdc7b58bc7c794fe1b6bad0c6d13298c5f298fde30b87058f47cd9840c265153029f8511690237ffaaa751589bcdbf7dae54f93be53e1150c9d209fdb