Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 22:09

General

  • Target

    NesKit.exe

  • Size

    5.4MB

  • MD5

    1ef709f774ae4318671e76beed90d7af

  • SHA1

    e0e4487ddc76757d89995566a8b7dc1e698d794d

  • SHA256

    e4f0a6eb07dc39164936251dead65ac4852fc199ef270e2bd7189ebe872e1068

  • SHA512

    d969570f39dc1fa57558eb335a14d51e7b76e2d0c04aa8d79554d18fff7b5dcacc28af6dccb55bb45293afbbc741a5f95d6bcece75ef2b275fbb8bc03a60f92e

  • SSDEEP

    98304:6i07JpmL+uKgxUNsMim5FDw+fvYo5V5FM6aUQ8/GTimyf8XksoCOPpEd4xLkC:vbisxU+M/DnDV5FMEGmv3KYpeKLF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 14 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NesKit.exe
    "C:\Users\Admin\AppData\Local\Temp\NesKit.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\is-2H21R.tmp\is-2O5UD.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2H21R.tmp\is-2O5UD.tmp" /SL4 $701EA "C:\Users\Admin\AppData\Local\Temp\NesKit.exe" 5424737 52224
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 21
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 helpmsg 21
          4⤵
            PID:1200
        • C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe
          "C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe"
          3⤵
          • Executes dropped EXE
          PID:2952
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 892
            4⤵
            • Program crash
            PID:2716
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 936
            4⤵
            • Program crash
            PID:2068
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 140
            4⤵
            • Program crash
            PID:828
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Query
          3⤵
            PID:4144
          • C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe
            "C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe" 517bc2c14ee152f7678424409b96ba17
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3748
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 876
              4⤵
              • Program crash
              PID:4584
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 884
              4⤵
              • Program crash
              PID:3912
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 952
              4⤵
              • Program crash
              PID:3396
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 1080
              4⤵
              • Program crash
              PID:220
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 1088
              4⤵
              • Program crash
              PID:4376
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 1092
              4⤵
              • Program crash
              PID:3988
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 1140
              4⤵
              • Program crash
              PID:2792
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 1320
              4⤵
              • Program crash
              PID:3880
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 1328
              4⤵
              • Program crash
              PID:2296
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 992
              4⤵
              • Program crash
              PID:3804
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 940
              4⤵
              • Program crash
              PID:1416
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /Delete /F /TN "SubtitleExtractor-821"
            3⤵
              PID:2204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2952 -ip 2952
          1⤵
            PID:4852
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2952 -ip 2952
            1⤵
              PID:4652
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2952 -ip 2952
              1⤵
                PID:716
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3748 -ip 3748
                1⤵
                  PID:2596
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3748 -ip 3748
                  1⤵
                    PID:396
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3748 -ip 3748
                    1⤵
                      PID:2348
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3748 -ip 3748
                      1⤵
                        PID:5012
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3748 -ip 3748
                        1⤵
                          PID:2784
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3748 -ip 3748
                          1⤵
                            PID:2532
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3748 -ip 3748
                            1⤵
                              PID:4216
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3748 -ip 3748
                              1⤵
                                PID:2748
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3748 -ip 3748
                                1⤵
                                  PID:1932
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3748 -ip 3748
                                  1⤵
                                    PID:4996
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3748 -ip 3748
                                    1⤵
                                      PID:4868

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe

                                      Filesize

                                      3.6MB

                                      MD5

                                      6a6e6c17b7252dffd9e2913616e7a24f

                                      SHA1

                                      5017ea99c41e34084c9aa70adc8c2e61cb274af0

                                      SHA256

                                      d52b86e9f52f5a8e2d22b29a066a4dc2e8d7747821f59ae1240e8d499ab9a9ea

                                      SHA512

                                      aaa5688ba2ce0d4fe0309314b981220937065ca569a4c5598a952aab52b596ce59fea61ee23cb86e2825ac282e4a82ccd662ea50381c63589d7be0e6da978daf

                                    • C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe

                                      Filesize

                                      3.6MB

                                      MD5

                                      6a6e6c17b7252dffd9e2913616e7a24f

                                      SHA1

                                      5017ea99c41e34084c9aa70adc8c2e61cb274af0

                                      SHA256

                                      d52b86e9f52f5a8e2d22b29a066a4dc2e8d7747821f59ae1240e8d499ab9a9ea

                                      SHA512

                                      aaa5688ba2ce0d4fe0309314b981220937065ca569a4c5598a952aab52b596ce59fea61ee23cb86e2825ac282e4a82ccd662ea50381c63589d7be0e6da978daf

                                    • C:\Users\Admin\AppData\Local\Temp\is-2H21R.tmp\is-2O5UD.tmp

                                      Filesize

                                      642KB

                                      MD5

                                      730d5d2b197c9647d45ca3ed5344c351

                                      SHA1

                                      cfa0d1008c365e038d91911af483b2d088afe027

                                      SHA256

                                      4c583fa76843eaba80f25a34627a4bf1bb1c9c9e00ea509322be387d3d453c71

                                      SHA512

                                      eb7f07b83d408733a6ee80fca18528f2e25d3bdf2033e69d76586bad32fbd8a317557bd9b75c950947d13e9fbb3e9129bbc82930ae88a7c337f06e22f8c0cfaa

                                    • C:\Users\Admin\AppData\Local\Temp\is-2H21R.tmp\is-2O5UD.tmp

                                      Filesize

                                      642KB

                                      MD5

                                      730d5d2b197c9647d45ca3ed5344c351

                                      SHA1

                                      cfa0d1008c365e038d91911af483b2d088afe027

                                      SHA256

                                      4c583fa76843eaba80f25a34627a4bf1bb1c9c9e00ea509322be387d3d453c71

                                      SHA512

                                      eb7f07b83d408733a6ee80fca18528f2e25d3bdf2033e69d76586bad32fbd8a317557bd9b75c950947d13e9fbb3e9129bbc82930ae88a7c337f06e22f8c0cfaa

                                    • C:\Users\Admin\AppData\Local\Temp\is-MRQV1.tmp\_iscrypt.dll

                                      Filesize

                                      2KB

                                      MD5

                                      a69559718ab506675e907fe49deb71e9

                                      SHA1

                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                      SHA256

                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                      SHA512

                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                    • memory/2176-134-0x0000000000400000-0x0000000000413000-memory.dmp

                                      Filesize

                                      76KB

                                    • memory/2176-294-0x0000000000400000-0x0000000000413000-memory.dmp

                                      Filesize

                                      76KB

                                    • memory/2952-288-0x0000000000400000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      7.6MB

                                    • memory/2952-286-0x0000000003710000-0x0000000003711000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2952-284-0x0000000000400000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      7.6MB

                                    • memory/2952-283-0x0000000000400000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      7.6MB

                                    • memory/2952-285-0x0000000000400000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      7.6MB

                                    • memory/3748-300-0x0000000000400000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      7.6MB

                                    • memory/3748-291-0x0000000000400000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      7.6MB

                                    • memory/3748-293-0x0000000000400000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      7.6MB

                                    • memory/3748-295-0x0000000002960000-0x0000000002961000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3748-304-0x0000000000400000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      7.6MB

                                    • memory/3748-301-0x0000000002960000-0x0000000002961000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3748-299-0x0000000000400000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      7.6MB

                                    • memory/3980-140-0x0000000000630000-0x0000000000631000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3980-298-0x0000000000400000-0x00000000004CF000-memory.dmp

                                      Filesize

                                      828KB

                                    • memory/3980-296-0x0000000000630000-0x0000000000631000-memory.dmp

                                      Filesize

                                      4KB