Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe
-
Size
1.8MB
-
MD5
534d6d8055cd45ece7d82abf8304f5d0
-
SHA1
d278deeb5247429c3e07253bb5560deab57f21a9
-
SHA256
2690b8e4bedbec81acfd83ecdda4fbb16de820469ece6177aa3960e172c8aad8
-
SHA512
b926b1a63ccd8042520125f09b761c25659171d81ef19357e460eaa9d32c6783d281647b4212f365d7dd57c02c0b4e5f252f50884c07381e229d2f2be9046ab6
-
SSDEEP
49152:MtccS4neHbyfYTOYKPu/gEjiEO5ItDVr+:Mt9S4neHvZjiEO5Ihg
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2748 MSWDM.EXE 2824 MSWDM.EXE 2696 NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE 2604 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2824 MSWDM.EXE 2824 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe File opened for modification C:\Windows\devC12.tmp NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe File opened for modification C:\Windows\devC12.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2824 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2748 3060 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 30 PID 3060 wrote to memory of 2748 3060 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 30 PID 3060 wrote to memory of 2748 3060 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 30 PID 3060 wrote to memory of 2748 3060 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 30 PID 3060 wrote to memory of 2824 3060 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 31 PID 3060 wrote to memory of 2824 3060 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 31 PID 3060 wrote to memory of 2824 3060 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 31 PID 3060 wrote to memory of 2824 3060 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 31 PID 2824 wrote to memory of 2696 2824 MSWDM.EXE 32 PID 2824 wrote to memory of 2696 2824 MSWDM.EXE 32 PID 2824 wrote to memory of 2696 2824 MSWDM.EXE 32 PID 2824 wrote to memory of 2696 2824 MSWDM.EXE 32 PID 2824 wrote to memory of 2604 2824 MSWDM.EXE 33 PID 2824 wrote to memory of 2604 2824 MSWDM.EXE 33 PID 2824 wrote to memory of 2604 2824 MSWDM.EXE 33 PID 2824 wrote to memory of 2604 2824 MSWDM.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2748
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devC12.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE
- Executes dropped EXE
PID:2696
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devC12.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD57b68f837808b9c62ed6d223ed28da3cb
SHA1b4ad5b11024ff5d841529d23333ee1fac72a954f
SHA2567f6c8e98b8e23b64426d98979321e50958af01a6d9ef3e1d46b222bf95586dae
SHA5123ba3f32b2e2c43b51b63a532ac9377a9653868d1a719e41fc8ef1fba972ffa56d76d94cbef2f94dd8d57161a468bb09baea87167cb1d09e208ef17dd67b3846b
-
Filesize
1.8MB
MD57b68f837808b9c62ed6d223ed28da3cb
SHA1b4ad5b11024ff5d841529d23333ee1fac72a954f
SHA2567f6c8e98b8e23b64426d98979321e50958af01a6d9ef3e1d46b222bf95586dae
SHA5123ba3f32b2e2c43b51b63a532ac9377a9653868d1a719e41fc8ef1fba972ffa56d76d94cbef2f94dd8d57161a468bb09baea87167cb1d09e208ef17dd67b3846b
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
1.8MB
MD510328584cd84654f69421ffa92ab0bc8
SHA12cd56c7a99b5355de58f28465c66957c48048860
SHA2566d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9
SHA5127a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45
-
Filesize
1.8MB
MD510328584cd84654f69421ffa92ab0bc8
SHA12cd56c7a99b5355de58f28465c66957c48048860
SHA2566d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9
SHA5127a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45
-
Filesize
1.8MB
MD510328584cd84654f69421ffa92ab0bc8
SHA12cd56c7a99b5355de58f28465c66957c48048860
SHA2566d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9
SHA5127a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45
-
Filesize
1.8MB
MD510328584cd84654f69421ffa92ab0bc8
SHA12cd56c7a99b5355de58f28465c66957c48048860
SHA2566d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9
SHA5127a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45
-
Filesize
1.8MB
MD510328584cd84654f69421ffa92ab0bc8
SHA12cd56c7a99b5355de58f28465c66957c48048860
SHA2566d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9
SHA5127a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2