Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2023, 15:27 UTC

General

  • Target

    NEAS.3986fafc1246177572db9e6200fbd1ee641e228f7b9dc972d95a195153e1ab80exe_JC.exe

  • Size

    1.1MB

  • MD5

    f6b10a72c68e0af83fdaed9c14eae092

  • SHA1

    a1cb2d4017df5d7ae3fd710f80ebe805e7ce84b9

  • SHA256

    3986fafc1246177572db9e6200fbd1ee641e228f7b9dc972d95a195153e1ab80

  • SHA512

    b9c5fc501e0e0b6a3e6bc65d7f3f571e3d775a70943503f2110a9b17f768c0330e18706ebc612965b3b4f7a889aa85202383e8d7aedf6aafccd201ef962395c2

  • SSDEEP

    24576:UyeCaL5yxt2sVzK6JdB77kokffmPAJXHSrmPeUPd2U3W6rHXyHUSgiL9ga:jeTL5yx8kK6LB77kokffyAJXYmPpl2Ws

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.3986fafc1246177572db9e6200fbd1ee641e228f7b9dc972d95a195153e1ab80exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.3986fafc1246177572db9e6200fbd1ee641e228f7b9dc972d95a195153e1ab80exe_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2832
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2904
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2444
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 268
                7⤵
                • Program crash
                PID:2768
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe

    Filesize

    1021KB

    MD5

    fca3f33c203a14eca161b495f6040bed

    SHA1

    ea725e6bd3092a65bc4ec6fffc59bf169ebd0b29

    SHA256

    3ae2cb89b9843ede7f6aa02ebcc9baab34a0f7533f58a5f14eb1121e68097eee

    SHA512

    1493f59962c19eb280f53ca61a6f69d81bc92419bd240be23106c131f7b4260a0fe331470f7842b4828230f3a6bed4bef2d803d8258ff8a6e3d37fcf4e817c27

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe

    Filesize

    1021KB

    MD5

    fca3f33c203a14eca161b495f6040bed

    SHA1

    ea725e6bd3092a65bc4ec6fffc59bf169ebd0b29

    SHA256

    3ae2cb89b9843ede7f6aa02ebcc9baab34a0f7533f58a5f14eb1121e68097eee

    SHA512

    1493f59962c19eb280f53ca61a6f69d81bc92419bd240be23106c131f7b4260a0fe331470f7842b4828230f3a6bed4bef2d803d8258ff8a6e3d37fcf4e817c27

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe

    Filesize

    725KB

    MD5

    e96b3f85dba1da7d73981a8ffeb3b489

    SHA1

    d5a93d61a7836db949fc2d8cc7ef385344845fbe

    SHA256

    8c639fb6439b66088dcbc5432b33f3ea1bcd859a3a2dcf294c5eee5b8db45659

    SHA512

    c61a36e708a5d5fc3f38671ab7baf6b95182dc4f9177aa4193e1ba2d15cc8190d25fb9db62685f999abe1245dc1e01d6abc47faeabbc5ae5904b568ef7bf4701

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe

    Filesize

    725KB

    MD5

    e96b3f85dba1da7d73981a8ffeb3b489

    SHA1

    d5a93d61a7836db949fc2d8cc7ef385344845fbe

    SHA256

    8c639fb6439b66088dcbc5432b33f3ea1bcd859a3a2dcf294c5eee5b8db45659

    SHA512

    c61a36e708a5d5fc3f38671ab7baf6b95182dc4f9177aa4193e1ba2d15cc8190d25fb9db62685f999abe1245dc1e01d6abc47faeabbc5ae5904b568ef7bf4701

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe

    Filesize

    479KB

    MD5

    50c41ae48b730196bd38dbfa8ed2a3ab

    SHA1

    aa2e6af7182bd64cbe2cdb0dba8629af71eebe6a

    SHA256

    3d8d71f0797018e588fa779ca608e3a5dddba62c6f6db595ff938a9ab029777f

    SHA512

    872ec4f30ff6e530e800ed655f048955f43a09846382a40d8a66ae9a125c35eb7b67b1ec8e4af684f23784e4730d9c0c156b84cbd3e6cf7cc76cc47a9fa60495

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe

    Filesize

    479KB

    MD5

    50c41ae48b730196bd38dbfa8ed2a3ab

    SHA1

    aa2e6af7182bd64cbe2cdb0dba8629af71eebe6a

    SHA256

    3d8d71f0797018e588fa779ca608e3a5dddba62c6f6db595ff938a9ab029777f

    SHA512

    872ec4f30ff6e530e800ed655f048955f43a09846382a40d8a66ae9a125c35eb7b67b1ec8e4af684f23784e4730d9c0c156b84cbd3e6cf7cc76cc47a9fa60495

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe

    Filesize

    1021KB

    MD5

    fca3f33c203a14eca161b495f6040bed

    SHA1

    ea725e6bd3092a65bc4ec6fffc59bf169ebd0b29

    SHA256

    3ae2cb89b9843ede7f6aa02ebcc9baab34a0f7533f58a5f14eb1121e68097eee

    SHA512

    1493f59962c19eb280f53ca61a6f69d81bc92419bd240be23106c131f7b4260a0fe331470f7842b4828230f3a6bed4bef2d803d8258ff8a6e3d37fcf4e817c27

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe

    Filesize

    1021KB

    MD5

    fca3f33c203a14eca161b495f6040bed

    SHA1

    ea725e6bd3092a65bc4ec6fffc59bf169ebd0b29

    SHA256

    3ae2cb89b9843ede7f6aa02ebcc9baab34a0f7533f58a5f14eb1121e68097eee

    SHA512

    1493f59962c19eb280f53ca61a6f69d81bc92419bd240be23106c131f7b4260a0fe331470f7842b4828230f3a6bed4bef2d803d8258ff8a6e3d37fcf4e817c27

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe

    Filesize

    725KB

    MD5

    e96b3f85dba1da7d73981a8ffeb3b489

    SHA1

    d5a93d61a7836db949fc2d8cc7ef385344845fbe

    SHA256

    8c639fb6439b66088dcbc5432b33f3ea1bcd859a3a2dcf294c5eee5b8db45659

    SHA512

    c61a36e708a5d5fc3f38671ab7baf6b95182dc4f9177aa4193e1ba2d15cc8190d25fb9db62685f999abe1245dc1e01d6abc47faeabbc5ae5904b568ef7bf4701

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe

    Filesize

    725KB

    MD5

    e96b3f85dba1da7d73981a8ffeb3b489

    SHA1

    d5a93d61a7836db949fc2d8cc7ef385344845fbe

    SHA256

    8c639fb6439b66088dcbc5432b33f3ea1bcd859a3a2dcf294c5eee5b8db45659

    SHA512

    c61a36e708a5d5fc3f38671ab7baf6b95182dc4f9177aa4193e1ba2d15cc8190d25fb9db62685f999abe1245dc1e01d6abc47faeabbc5ae5904b568ef7bf4701

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe

    Filesize

    479KB

    MD5

    50c41ae48b730196bd38dbfa8ed2a3ab

    SHA1

    aa2e6af7182bd64cbe2cdb0dba8629af71eebe6a

    SHA256

    3d8d71f0797018e588fa779ca608e3a5dddba62c6f6db595ff938a9ab029777f

    SHA512

    872ec4f30ff6e530e800ed655f048955f43a09846382a40d8a66ae9a125c35eb7b67b1ec8e4af684f23784e4730d9c0c156b84cbd3e6cf7cc76cc47a9fa60495

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe

    Filesize

    479KB

    MD5

    50c41ae48b730196bd38dbfa8ed2a3ab

    SHA1

    aa2e6af7182bd64cbe2cdb0dba8629af71eebe6a

    SHA256

    3d8d71f0797018e588fa779ca608e3a5dddba62c6f6db595ff938a9ab029777f

    SHA512

    872ec4f30ff6e530e800ed655f048955f43a09846382a40d8a66ae9a125c35eb7b67b1ec8e4af684f23784e4730d9c0c156b84cbd3e6cf7cc76cc47a9fa60495

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

    Filesize

    423KB

    MD5

    61088520a959421e5cf8dfa74fe31386

    SHA1

    ee6899a8726356ead04d7d05baec65b16b958e36

    SHA256

    78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

    SHA512

    281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

  • memory/2444-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2444-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2444-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2444-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2444-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2444-82-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2444-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2444-86-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2444-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2444-84-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2832-57-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-65-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-47-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-45-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-51-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-53-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-55-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-59-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-63-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-49-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-69-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-67-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-61-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-43-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-42-0x0000000002280000-0x0000000002296000-memory.dmp

    Filesize

    88KB

  • memory/2832-41-0x0000000002280000-0x000000000229C000-memory.dmp

    Filesize

    112KB

  • memory/2832-40-0x0000000000390000-0x00000000003AE000-memory.dmp

    Filesize

    120KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.