Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 09:00

General

  • Target

    183bdf48a8a9d53bfc8b311739377670_NEAS.exe

  • Size

    591KB

  • MD5

    183bdf48a8a9d53bfc8b311739377670

  • SHA1

    62c40790873bf0833613136eb54949b5c0d62458

  • SHA256

    6f11a9a21940da807d5680298539503bf1829ec96dda1355ffb719b2f631bcde

  • SHA512

    e2212c3d27cf2704678db65923c13e81501bbcafe83388ba67f57eb124551aa82709ca9b9565cc4842aefa184aff58fd11255d506e8085e89233a7d551821fdc

  • SSDEEP

    12288:VGbZFT9o+WkcS9SQcCyfi0npM4dl0v5Jdm5IpXt1Up0:UT97jD9QCyfiEM4dmv5BJtOp0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe
      C:\Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:2248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe

    Filesize

    591KB

    MD5

    e7a288cd7bd90f3c27dfe81e0d53b36c

    SHA1

    199b897ffbdc802d9dc79f34560d805c94bbbdc0

    SHA256

    dbfa2273fb82df6a8958c4871b0fe2d3a56f1d5919fbd926cb856131cb74bfa6

    SHA512

    a92e1fa76413e57a55b84cdc227c886dcfd6c8d07880ccbdde3a39f89a2969af04b0991c7d3373dec075cd75f757acfe0bca9c8c75d6619e9b8e1c8904c8ec99

  • memory/2244-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2244-9-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2248-10-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2248-16-0x0000000000130000-0x000000000016F000-memory.dmp

    Filesize

    252KB

  • memory/2248-11-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2248-17-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB