Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
18/11/2023, 07:21
Behavioral task
behavioral1
Sample
NEAS.82d8f58a170837c3a8426a6a3d372740.exe
Resource
win7-20231025-en
General
-
Target
NEAS.82d8f58a170837c3a8426a6a3d372740.exe
-
Size
436KB
-
MD5
82d8f58a170837c3a8426a6a3d372740
-
SHA1
b560ced3c13531bacd2df377e93b54cc430e157f
-
SHA256
ce88880c864e08ea3f05fda81c87f9836b911e749a5c06128ff680ec14a31e56
-
SHA512
c3fe4fdd54a124639ef2f863809ff9e8d59edb4f9f5e21b2c90270461255113c38fcaca6037995b87c9bdc76f401313239035bcacdcb8e794f0a2915ca64e943
-
SSDEEP
6144:0KcGGKC2No1dYL+cuGvd7jpBAbn+cioljJCnViTQBCA8R8Fs5cvxFQLrANOqk:G1KCJcuGvFpBAbnJj4nfBKmxFUrAlk
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
pid Process 2720 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2152 wejar.exe 2564 pomoh.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 2152 wejar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe 2564 pomoh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2152 2392 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 27 PID 2392 wrote to memory of 2152 2392 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 27 PID 2392 wrote to memory of 2152 2392 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 27 PID 2392 wrote to memory of 2152 2392 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 27 PID 2392 wrote to memory of 2720 2392 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 28 PID 2392 wrote to memory of 2720 2392 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 28 PID 2392 wrote to memory of 2720 2392 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 28 PID 2392 wrote to memory of 2720 2392 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 28 PID 2152 wrote to memory of 2564 2152 wejar.exe 32 PID 2152 wrote to memory of 2564 2152 wejar.exe 32 PID 2152 wrote to memory of 2564 2152 wejar.exe 32 PID 2152 wrote to memory of 2564 2152 wejar.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.82d8f58a170837c3a8426a6a3d372740.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.82d8f58a170837c3a8426a6a3d372740.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\wejar.exe"C:\Users\Admin\AppData\Local\Temp\wejar.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\pomoh.exe"C:\Users\Admin\AppData\Local\Temp\pomoh.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286B
MD59e0157787d337ab97816d790f66ba499
SHA18aea5be667d5a627b444cbe13ebce0ed7dca8d21
SHA256a099c5cc7259c6a4875fae54ff2d720252932ee65d7450197181bb40eea90070
SHA512b815f63578fc389140aedc29aa5a8f62552bb8223873739f8a70fb75605cc7a4ce16292fc6002223adaf766748c0ba81623c417fa389d4a03203e9e24c9c4292
-
Filesize
286B
MD59e0157787d337ab97816d790f66ba499
SHA18aea5be667d5a627b444cbe13ebce0ed7dca8d21
SHA256a099c5cc7259c6a4875fae54ff2d720252932ee65d7450197181bb40eea90070
SHA512b815f63578fc389140aedc29aa5a8f62552bb8223873739f8a70fb75605cc7a4ce16292fc6002223adaf766748c0ba81623c417fa389d4a03203e9e24c9c4292
-
Filesize
512B
MD55f78d0b640685f0b72ae01a936db82aa
SHA1e6cb6c5d6b3430a45fd3709b99f6c30d86703c0c
SHA2567012edb41a684714301d60761b1c9e2feb095ce7b35999af30dc05968477f63a
SHA5128629bdc89c1a69810b17aa42b39160a6b6aedf9a485d0f270067f0401af24ddc43291a24ca6a31e46eee64cb576940005276f6f18d99089060833712d18aa718
-
Filesize
196KB
MD588dc8e3213da9b6beb6feef41e20fb1e
SHA17d9a9a0138fc101f82beab502a892e6f0486684f
SHA2569d8099678996950f322bb4f50ad6323a1f723ef6be994439f5310f2057d8257b
SHA512dccc5be45a482f434a2b4514630361a6ef46f487530508270a8e42d82ec32386a5262d8b1d0bc642620da487071a98b66084b301faa58daca621034748dab08d
-
Filesize
436KB
MD5750402a1aa23e73b3b0fada41486368b
SHA1a4ee0312ab81d8da24ceb93400a4d6e9fc6e8fe1
SHA2567b80502add8f790344dddd975b55972a5dd928dce4430b9a7089e709615e0cf6
SHA512e2b15dda4ec6fdaf52cd3e6b7681151c3e77cdc5d68c8d19f6cef2c1336350350db5564c61d9ee84d5c0a84bd19d4c482f3e3378f94919715f971a4cbcd5a472
-
Filesize
436KB
MD5750402a1aa23e73b3b0fada41486368b
SHA1a4ee0312ab81d8da24ceb93400a4d6e9fc6e8fe1
SHA2567b80502add8f790344dddd975b55972a5dd928dce4430b9a7089e709615e0cf6
SHA512e2b15dda4ec6fdaf52cd3e6b7681151c3e77cdc5d68c8d19f6cef2c1336350350db5564c61d9ee84d5c0a84bd19d4c482f3e3378f94919715f971a4cbcd5a472
-
Filesize
196KB
MD588dc8e3213da9b6beb6feef41e20fb1e
SHA17d9a9a0138fc101f82beab502a892e6f0486684f
SHA2569d8099678996950f322bb4f50ad6323a1f723ef6be994439f5310f2057d8257b
SHA512dccc5be45a482f434a2b4514630361a6ef46f487530508270a8e42d82ec32386a5262d8b1d0bc642620da487071a98b66084b301faa58daca621034748dab08d
-
Filesize
436KB
MD5750402a1aa23e73b3b0fada41486368b
SHA1a4ee0312ab81d8da24ceb93400a4d6e9fc6e8fe1
SHA2567b80502add8f790344dddd975b55972a5dd928dce4430b9a7089e709615e0cf6
SHA512e2b15dda4ec6fdaf52cd3e6b7681151c3e77cdc5d68c8d19f6cef2c1336350350db5564c61d9ee84d5c0a84bd19d4c482f3e3378f94919715f971a4cbcd5a472