Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
NesKit.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NesKit.exe
Resource
win10v2004-20230703-en
General
-
Target
NesKit.exe
-
Size
5.4MB
-
MD5
1ef709f774ae4318671e76beed90d7af
-
SHA1
e0e4487ddc76757d89995566a8b7dc1e698d794d
-
SHA256
e4f0a6eb07dc39164936251dead65ac4852fc199ef270e2bd7189ebe872e1068
-
SHA512
d969570f39dc1fa57558eb335a14d51e7b76e2d0c04aa8d79554d18fff7b5dcacc28af6dccb55bb45293afbbc741a5f95d6bcece75ef2b275fbb8bc03a60f92e
-
SSDEEP
98304:6i07JpmL+uKgxUNsMim5FDw+fvYo5V5FM6aUQ8/GTimyf8XksoCOPpEd4xLkC:vbisxU+M/DnDV5FMEGmv3KYpeKLF
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3980 is-2O5UD.tmp 2952 SubtitleExtractor.exe 3748 SubtitleExtractor.exe -
Loads dropped DLL 1 IoCs
pid Process 3980 is-2O5UD.tmp -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-J0N4K.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\is-217U4.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\item\is-8OQPQ.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\loading\is-549AV.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-AEJT4.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-QBBQE.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\item\is-9P2GK.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-RLHB1.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-DBU7F.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\ScrollBar\is-I860L.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\ScrollBar\is-S3HDB.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\unins000.dat is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\is-UEGEN.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-1PUKU.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-A47UB.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-EBH0Q.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\pic\is-42GH2.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\is-JKAOF.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-IJHQS.tmp is-2O5UD.tmp File opened for modification C:\Program Files (x86)\NesKit Subtitle Extractor\unins000.dat is-2O5UD.tmp File opened for modification C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-M3B6S.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-U1PVK.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-5BQBO.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-4EH9T.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-KO8DK.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-OLQ9M.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\pic\is-1B8EJ.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\is-BGEUQ.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-KRBOJ.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-3B4MK.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-71O3J.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\platforms\is-F0TAI.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-PODJV.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-7TSI2.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-4R3EN.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-FE8BO.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\pic\is-KL3NE.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-VAFQH.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-IBJEU.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-AG1E9.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\pic\is-Q26DK.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-4M2MG.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-S0O6A.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\ScrollBar\is-F8N9K.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-RUFMU.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-97D12.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\is-AUS8I.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-FQJBB.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\is-TPBOA.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\is-5PMBG.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-P0P0A.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-LRTAT.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-EKKV8.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-LQ7RC.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\ScrollBar\is-J2O4U.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\is-08FL2.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\pic\is-B3ICP.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-U51R6.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\loading\is-683H1.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\imageformats\is-OVHOI.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\pic\is-4K3BR.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-K9RGG.tmp is-2O5UD.tmp File created C:\Program Files (x86)\NesKit Subtitle Extractor\images\is-AEQPB.tmp is-2O5UD.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 14 IoCs
pid pid_target Process procid_target 2716 2952 WerFault.exe 84 2068 2952 WerFault.exe 84 828 2952 WerFault.exe 84 4584 3748 WerFault.exe 99 3912 3748 WerFault.exe 99 3396 3748 WerFault.exe 99 220 3748 WerFault.exe 99 4376 3748 WerFault.exe 99 3988 3748 WerFault.exe 99 2792 3748 WerFault.exe 99 3880 3748 WerFault.exe 99 2296 3748 WerFault.exe 99 3804 3748 WerFault.exe 99 1416 3748 WerFault.exe 99 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3748 SubtitleExtractor.exe 3748 SubtitleExtractor.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2176 wrote to memory of 3980 2176 NesKit.exe 81 PID 2176 wrote to memory of 3980 2176 NesKit.exe 81 PID 2176 wrote to memory of 3980 2176 NesKit.exe 81 PID 3980 wrote to memory of 2616 3980 is-2O5UD.tmp 82 PID 3980 wrote to memory of 2616 3980 is-2O5UD.tmp 82 PID 3980 wrote to memory of 2616 3980 is-2O5UD.tmp 82 PID 3980 wrote to memory of 2952 3980 is-2O5UD.tmp 84 PID 3980 wrote to memory of 2952 3980 is-2O5UD.tmp 84 PID 3980 wrote to memory of 2952 3980 is-2O5UD.tmp 84 PID 2616 wrote to memory of 1200 2616 net.exe 85 PID 2616 wrote to memory of 1200 2616 net.exe 85 PID 2616 wrote to memory of 1200 2616 net.exe 85 PID 3980 wrote to memory of 4144 3980 is-2O5UD.tmp 97 PID 3980 wrote to memory of 4144 3980 is-2O5UD.tmp 97 PID 3980 wrote to memory of 4144 3980 is-2O5UD.tmp 97 PID 3980 wrote to memory of 2204 3980 is-2O5UD.tmp 100 PID 3980 wrote to memory of 2204 3980 is-2O5UD.tmp 100 PID 3980 wrote to memory of 2204 3980 is-2O5UD.tmp 100 PID 3980 wrote to memory of 3748 3980 is-2O5UD.tmp 99 PID 3980 wrote to memory of 3748 3980 is-2O5UD.tmp 99 PID 3980 wrote to memory of 3748 3980 is-2O5UD.tmp 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\NesKit.exe"C:\Users\Admin\AppData\Local\Temp\NesKit.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\is-2H21R.tmp\is-2O5UD.tmp"C:\Users\Admin\AppData\Local\Temp\is-2H21R.tmp\is-2O5UD.tmp" /SL4 $701EA "C:\Users\Admin\AppData\Local\Temp\NesKit.exe" 5424737 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 213⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 214⤵PID:1200
-
-
-
C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe"C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe"3⤵
- Executes dropped EXE
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 8924⤵
- Program crash
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 9364⤵
- Program crash
PID:2068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 1404⤵
- Program crash
PID:828
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:4144
-
-
C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe"C:\Program Files (x86)\NesKit Subtitle Extractor\SubtitleExtractor.exe" 517bc2c14ee152f7678424409b96ba173⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 8764⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 8844⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 9524⤵
- Program crash
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 10804⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 10884⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 10924⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 11404⤵
- Program crash
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 13204⤵
- Program crash
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 13284⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 9924⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 9404⤵
- Program crash
PID:1416
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "SubtitleExtractor-821"3⤵PID:2204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2952 -ip 29521⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2952 -ip 29521⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2952 -ip 29521⤵PID:716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3748 -ip 37481⤵PID:2596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3748 -ip 37481⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3748 -ip 37481⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3748 -ip 37481⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3748 -ip 37481⤵PID:2784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3748 -ip 37481⤵PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3748 -ip 37481⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3748 -ip 37481⤵PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3748 -ip 37481⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3748 -ip 37481⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3748 -ip 37481⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD56a6e6c17b7252dffd9e2913616e7a24f
SHA15017ea99c41e34084c9aa70adc8c2e61cb274af0
SHA256d52b86e9f52f5a8e2d22b29a066a4dc2e8d7747821f59ae1240e8d499ab9a9ea
SHA512aaa5688ba2ce0d4fe0309314b981220937065ca569a4c5598a952aab52b596ce59fea61ee23cb86e2825ac282e4a82ccd662ea50381c63589d7be0e6da978daf
-
Filesize
3.6MB
MD56a6e6c17b7252dffd9e2913616e7a24f
SHA15017ea99c41e34084c9aa70adc8c2e61cb274af0
SHA256d52b86e9f52f5a8e2d22b29a066a4dc2e8d7747821f59ae1240e8d499ab9a9ea
SHA512aaa5688ba2ce0d4fe0309314b981220937065ca569a4c5598a952aab52b596ce59fea61ee23cb86e2825ac282e4a82ccd662ea50381c63589d7be0e6da978daf
-
Filesize
642KB
MD5730d5d2b197c9647d45ca3ed5344c351
SHA1cfa0d1008c365e038d91911af483b2d088afe027
SHA2564c583fa76843eaba80f25a34627a4bf1bb1c9c9e00ea509322be387d3d453c71
SHA512eb7f07b83d408733a6ee80fca18528f2e25d3bdf2033e69d76586bad32fbd8a317557bd9b75c950947d13e9fbb3e9129bbc82930ae88a7c337f06e22f8c0cfaa
-
Filesize
642KB
MD5730d5d2b197c9647d45ca3ed5344c351
SHA1cfa0d1008c365e038d91911af483b2d088afe027
SHA2564c583fa76843eaba80f25a34627a4bf1bb1c9c9e00ea509322be387d3d453c71
SHA512eb7f07b83d408733a6ee80fca18528f2e25d3bdf2033e69d76586bad32fbd8a317557bd9b75c950947d13e9fbb3e9129bbc82930ae88a7c337f06e22f8c0cfaa
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63