Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe
-
Size
1.5MB
-
MD5
cab88375a222aed486d912769a215eb2
-
SHA1
6834b80895cc4a9ea07b3a5b5b28d58d6af16f14
-
SHA256
9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4
-
SHA512
c3f924584f130e261c9caba8c3facab6d649719e733aee6b84a36bb0de4f0be2d82771a8bdf395c222345264f959db66ec364970896960de687a47be68aa8dee
-
SSDEEP
24576:ky550RUJ4/RBxNSClW7Dp3iUshUDntrVZbxBi1tHnneOMCvcMlNCSTXBeEH27ONH:zchLSCGDJwhAt8eOzvccNFBeEHQOu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1060 ZX0xE66.exe 2248 nV1mU73.exe 2684 cT2GS93.exe 2616 1YB95Lx8.exe -
Loads dropped DLL 12 IoCs
pid Process 2252 NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe 1060 ZX0xE66.exe 1060 ZX0xE66.exe 2248 nV1mU73.exe 2248 nV1mU73.exe 2684 cT2GS93.exe 2684 cT2GS93.exe 2616 1YB95Lx8.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ZX0xE66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nV1mU73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" cT2GS93.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2616 set thread context of 2624 2616 1YB95Lx8.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2608 2616 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2624 AppLaunch.exe 2624 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2624 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1060 2252 NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe 28 PID 2252 wrote to memory of 1060 2252 NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe 28 PID 2252 wrote to memory of 1060 2252 NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe 28 PID 2252 wrote to memory of 1060 2252 NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe 28 PID 2252 wrote to memory of 1060 2252 NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe 28 PID 2252 wrote to memory of 1060 2252 NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe 28 PID 2252 wrote to memory of 1060 2252 NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe 28 PID 1060 wrote to memory of 2248 1060 ZX0xE66.exe 29 PID 1060 wrote to memory of 2248 1060 ZX0xE66.exe 29 PID 1060 wrote to memory of 2248 1060 ZX0xE66.exe 29 PID 1060 wrote to memory of 2248 1060 ZX0xE66.exe 29 PID 1060 wrote to memory of 2248 1060 ZX0xE66.exe 29 PID 1060 wrote to memory of 2248 1060 ZX0xE66.exe 29 PID 1060 wrote to memory of 2248 1060 ZX0xE66.exe 29 PID 2248 wrote to memory of 2684 2248 nV1mU73.exe 30 PID 2248 wrote to memory of 2684 2248 nV1mU73.exe 30 PID 2248 wrote to memory of 2684 2248 nV1mU73.exe 30 PID 2248 wrote to memory of 2684 2248 nV1mU73.exe 30 PID 2248 wrote to memory of 2684 2248 nV1mU73.exe 30 PID 2248 wrote to memory of 2684 2248 nV1mU73.exe 30 PID 2248 wrote to memory of 2684 2248 nV1mU73.exe 30 PID 2684 wrote to memory of 2616 2684 cT2GS93.exe 31 PID 2684 wrote to memory of 2616 2684 cT2GS93.exe 31 PID 2684 wrote to memory of 2616 2684 cT2GS93.exe 31 PID 2684 wrote to memory of 2616 2684 cT2GS93.exe 31 PID 2684 wrote to memory of 2616 2684 cT2GS93.exe 31 PID 2684 wrote to memory of 2616 2684 cT2GS93.exe 31 PID 2684 wrote to memory of 2616 2684 cT2GS93.exe 31 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2624 2616 1YB95Lx8.exe 32 PID 2616 wrote to memory of 2608 2616 1YB95Lx8.exe 33 PID 2616 wrote to memory of 2608 2616 1YB95Lx8.exe 33 PID 2616 wrote to memory of 2608 2616 1YB95Lx8.exe 33 PID 2616 wrote to memory of 2608 2616 1YB95Lx8.exe 33 PID 2616 wrote to memory of 2608 2616 1YB95Lx8.exe 33 PID 2616 wrote to memory of 2608 2616 1YB95Lx8.exe 33 PID 2616 wrote to memory of 2608 2616 1YB95Lx8.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS9add5802e66d1caa124c5c7dec9f040a99de180d2f50ae257cbc30f995b9fbb4exeexeexe_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZX0xE66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZX0xE66.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nV1mU73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nV1mU73.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cT2GS93.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cT2GS93.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1YB95Lx8.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1YB95Lx8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2608
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f7e9f4a2c4f4f38f3cbdd6130c9475a5
SHA15556fa987fd58196ab0e988d617700f17dfc6bc0
SHA256ace894e51f7e082ec5142b73203166c55b8cc5c04b4d2b9d918d404b852750d7
SHA512f05b0820ac30da870b540e350b873013949360f7f578969588669237e4134ce1c65f58d9620acbfb1055663e129e58ddc7c63d0855137f9c397cbf107efaa3b7
-
Filesize
1.3MB
MD5f7e9f4a2c4f4f38f3cbdd6130c9475a5
SHA15556fa987fd58196ab0e988d617700f17dfc6bc0
SHA256ace894e51f7e082ec5142b73203166c55b8cc5c04b4d2b9d918d404b852750d7
SHA512f05b0820ac30da870b540e350b873013949360f7f578969588669237e4134ce1c65f58d9620acbfb1055663e129e58ddc7c63d0855137f9c397cbf107efaa3b7
-
Filesize
931KB
MD55d9a4349ee799d2633b44c9b0be568e8
SHA1b4ace00424de7518b99c7a9f4ffbd4da52e7ac98
SHA256d59f99c9347d30247adb1f4f37f0f1300a0b905789e397ca0e19ed521ddb7a87
SHA5128dc8f3c5e13c34e7d0447fe4cc5e12720be808b37eed162dcb9f3de393da50418c640bfc423039798fc8a52ecf222e4bbc85dfe1ffddefc36d3ca0c01dd8aa2e
-
Filesize
931KB
MD55d9a4349ee799d2633b44c9b0be568e8
SHA1b4ace00424de7518b99c7a9f4ffbd4da52e7ac98
SHA256d59f99c9347d30247adb1f4f37f0f1300a0b905789e397ca0e19ed521ddb7a87
SHA5128dc8f3c5e13c34e7d0447fe4cc5e12720be808b37eed162dcb9f3de393da50418c640bfc423039798fc8a52ecf222e4bbc85dfe1ffddefc36d3ca0c01dd8aa2e
-
Filesize
549KB
MD5767ef94eba6a583e9065e909202b4986
SHA15e33e89fd62e6e52756af5b1cf9e3d69a0fd4c42
SHA256f82a3c12a06d8c127e983c2066637f2b1096d9792302aba62c159eace6afbb52
SHA51242d50799bb314faa3d1818e189ac90e6d73cd4c844106b58cb586cfdbf30c8dbe7c7bfde52fc1d17d31e68804d361be58b5de9fd07123d37cee678161e41365a
-
Filesize
549KB
MD5767ef94eba6a583e9065e909202b4986
SHA15e33e89fd62e6e52756af5b1cf9e3d69a0fd4c42
SHA256f82a3c12a06d8c127e983c2066637f2b1096d9792302aba62c159eace6afbb52
SHA51242d50799bb314faa3d1818e189ac90e6d73cd4c844106b58cb586cfdbf30c8dbe7c7bfde52fc1d17d31e68804d361be58b5de9fd07123d37cee678161e41365a
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.3MB
MD5f7e9f4a2c4f4f38f3cbdd6130c9475a5
SHA15556fa987fd58196ab0e988d617700f17dfc6bc0
SHA256ace894e51f7e082ec5142b73203166c55b8cc5c04b4d2b9d918d404b852750d7
SHA512f05b0820ac30da870b540e350b873013949360f7f578969588669237e4134ce1c65f58d9620acbfb1055663e129e58ddc7c63d0855137f9c397cbf107efaa3b7
-
Filesize
1.3MB
MD5f7e9f4a2c4f4f38f3cbdd6130c9475a5
SHA15556fa987fd58196ab0e988d617700f17dfc6bc0
SHA256ace894e51f7e082ec5142b73203166c55b8cc5c04b4d2b9d918d404b852750d7
SHA512f05b0820ac30da870b540e350b873013949360f7f578969588669237e4134ce1c65f58d9620acbfb1055663e129e58ddc7c63d0855137f9c397cbf107efaa3b7
-
Filesize
931KB
MD55d9a4349ee799d2633b44c9b0be568e8
SHA1b4ace00424de7518b99c7a9f4ffbd4da52e7ac98
SHA256d59f99c9347d30247adb1f4f37f0f1300a0b905789e397ca0e19ed521ddb7a87
SHA5128dc8f3c5e13c34e7d0447fe4cc5e12720be808b37eed162dcb9f3de393da50418c640bfc423039798fc8a52ecf222e4bbc85dfe1ffddefc36d3ca0c01dd8aa2e
-
Filesize
931KB
MD55d9a4349ee799d2633b44c9b0be568e8
SHA1b4ace00424de7518b99c7a9f4ffbd4da52e7ac98
SHA256d59f99c9347d30247adb1f4f37f0f1300a0b905789e397ca0e19ed521ddb7a87
SHA5128dc8f3c5e13c34e7d0447fe4cc5e12720be808b37eed162dcb9f3de393da50418c640bfc423039798fc8a52ecf222e4bbc85dfe1ffddefc36d3ca0c01dd8aa2e
-
Filesize
549KB
MD5767ef94eba6a583e9065e909202b4986
SHA15e33e89fd62e6e52756af5b1cf9e3d69a0fd4c42
SHA256f82a3c12a06d8c127e983c2066637f2b1096d9792302aba62c159eace6afbb52
SHA51242d50799bb314faa3d1818e189ac90e6d73cd4c844106b58cb586cfdbf30c8dbe7c7bfde52fc1d17d31e68804d361be58b5de9fd07123d37cee678161e41365a
-
Filesize
549KB
MD5767ef94eba6a583e9065e909202b4986
SHA15e33e89fd62e6e52756af5b1cf9e3d69a0fd4c42
SHA256f82a3c12a06d8c127e983c2066637f2b1096d9792302aba62c159eace6afbb52
SHA51242d50799bb314faa3d1818e189ac90e6d73cd4c844106b58cb586cfdbf30c8dbe7c7bfde52fc1d17d31e68804d361be58b5de9fd07123d37cee678161e41365a
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81