Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7471d5098b5ed288244e55d09fac9039.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.7471d5098b5ed288244e55d09fac9039.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.7471d5098b5ed288244e55d09fac9039.exe
-
Size
108KB
-
MD5
7471d5098b5ed288244e55d09fac9039
-
SHA1
fd60d0efe12ff154b5d769aafd674c2fafa3faf0
-
SHA256
ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
-
SHA512
db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
SSDEEP
768:qZL/0F24lercjO4sTZg5ZLvn2IuWZ0kqqNPWQHS:OLsF2Kerc64sTiX2IV0DB1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2748 WINWORD.exe 2736 WINWORD.exe -
Loads dropped DLL 4 IoCs
pid Process 2056 NEAS.7471d5098b5ed288244e55d09fac9039.exe 2056 NEAS.7471d5098b5ed288244e55d09fac9039.exe 2784 cmd.exe 2784 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\WINWORD = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\WINWORD.exe -r" WINWORD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2832 PING.EXE 2676 PING.EXE 2428 PING.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2748 2056 NEAS.7471d5098b5ed288244e55d09fac9039.exe 28 PID 2056 wrote to memory of 2748 2056 NEAS.7471d5098b5ed288244e55d09fac9039.exe 28 PID 2056 wrote to memory of 2748 2056 NEAS.7471d5098b5ed288244e55d09fac9039.exe 28 PID 2056 wrote to memory of 2748 2056 NEAS.7471d5098b5ed288244e55d09fac9039.exe 28 PID 2748 wrote to memory of 2784 2748 WINWORD.exe 29 PID 2748 wrote to memory of 2784 2748 WINWORD.exe 29 PID 2748 wrote to memory of 2784 2748 WINWORD.exe 29 PID 2748 wrote to memory of 2784 2748 WINWORD.exe 29 PID 2784 wrote to memory of 2832 2784 cmd.exe 31 PID 2784 wrote to memory of 2832 2784 cmd.exe 31 PID 2784 wrote to memory of 2832 2784 cmd.exe 31 PID 2784 wrote to memory of 2832 2784 cmd.exe 31 PID 2784 wrote to memory of 2676 2784 cmd.exe 32 PID 2784 wrote to memory of 2676 2784 cmd.exe 32 PID 2784 wrote to memory of 2676 2784 cmd.exe 32 PID 2784 wrote to memory of 2676 2784 cmd.exe 32 PID 2784 wrote to memory of 2428 2784 cmd.exe 33 PID 2784 wrote to memory of 2428 2784 cmd.exe 33 PID 2784 wrote to memory of 2428 2784 cmd.exe 33 PID 2784 wrote to memory of 2428 2784 cmd.exe 33 PID 2784 wrote to memory of 2736 2784 cmd.exe 34 PID 2784 wrote to memory of 2736 2784 cmd.exe 34 PID 2784 wrote to memory of 2736 2784 cmd.exe 34 PID 2784 wrote to memory of 2736 2784 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7471d5098b5ed288244e55d09fac9039.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7471d5098b5ed288244e55d09fac9039.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" -r2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 2&del "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"&ping 127.0.0.1 -n 2&rename "C:\Users\Admin\AppData\Roaming\Mozilla\00001B50" WINWORD.exe&ping 127.0.0.1 -n 2&"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2832
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2676
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2428
-
-
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2736
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD554539869735a04f4680899257b093dad
SHA143fba3930b4c980030bb57bf23d88fce7a903ad7
SHA256136ebd583563a24c3834fb42ec879d26a5136e6eb82ce653f0a93e2ceaa09c42
SHA5120afa6e2cdc7b58bc7c794fe1b6bad0c6d13298c5f298fde30b87058f47cd9840c265153029f8511690237ffaaa751589bcdbf7dae54f93be53e1150c9d209fdb
-
Filesize
108KB
MD57471d5098b5ed288244e55d09fac9039
SHA1fd60d0efe12ff154b5d769aafd674c2fafa3faf0
SHA256ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
SHA512db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
Filesize
108KB
MD57471d5098b5ed288244e55d09fac9039
SHA1fd60d0efe12ff154b5d769aafd674c2fafa3faf0
SHA256ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
SHA512db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
Filesize
108KB
MD57471d5098b5ed288244e55d09fac9039
SHA1fd60d0efe12ff154b5d769aafd674c2fafa3faf0
SHA256ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
SHA512db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
Filesize
108KB
MD554539869735a04f4680899257b093dad
SHA143fba3930b4c980030bb57bf23d88fce7a903ad7
SHA256136ebd583563a24c3834fb42ec879d26a5136e6eb82ce653f0a93e2ceaa09c42
SHA5120afa6e2cdc7b58bc7c794fe1b6bad0c6d13298c5f298fde30b87058f47cd9840c265153029f8511690237ffaaa751589bcdbf7dae54f93be53e1150c9d209fdb
-
Filesize
108KB
MD57471d5098b5ed288244e55d09fac9039
SHA1fd60d0efe12ff154b5d769aafd674c2fafa3faf0
SHA256ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
SHA512db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
Filesize
108KB
MD57471d5098b5ed288244e55d09fac9039
SHA1fd60d0efe12ff154b5d769aafd674c2fafa3faf0
SHA256ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
SHA512db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
Filesize
108KB
MD554539869735a04f4680899257b093dad
SHA143fba3930b4c980030bb57bf23d88fce7a903ad7
SHA256136ebd583563a24c3834fb42ec879d26a5136e6eb82ce653f0a93e2ceaa09c42
SHA5120afa6e2cdc7b58bc7c794fe1b6bad0c6d13298c5f298fde30b87058f47cd9840c265153029f8511690237ffaaa751589bcdbf7dae54f93be53e1150c9d209fdb
-
Filesize
108KB
MD554539869735a04f4680899257b093dad
SHA143fba3930b4c980030bb57bf23d88fce7a903ad7
SHA256136ebd583563a24c3834fb42ec879d26a5136e6eb82ce653f0a93e2ceaa09c42
SHA5120afa6e2cdc7b58bc7c794fe1b6bad0c6d13298c5f298fde30b87058f47cd9840c265153029f8511690237ffaaa751589bcdbf7dae54f93be53e1150c9d209fdb