Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe
-
Size
878KB
-
MD5
b639244519764d606ac92428a744bfa0
-
SHA1
e92a06ca778547ff248c2d73d6c6038851529dfc
-
SHA256
cde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0f
-
SHA512
e023f74680fbda2e22f01b65dcac0aec8335dfb45b9726d013ced74a0e1f1c1e869a239a5163edd34d725ef86858980e1047a4a5e81f23c5a562a2b898cb02f3
-
SSDEEP
24576:VygZpR/5ZCqbcUKGIyjq+ilI5HjPn7GZ2wv:wGR/rUGIyjzWO7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1884 zF9oD24.exe 2640 cM8af82.exe 2560 VJ0bu40.exe 2364 1BY19ac0.exe -
Loads dropped DLL 13 IoCs
pid Process 2832 NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe 1884 zF9oD24.exe 1884 zF9oD24.exe 2640 cM8af82.exe 2640 cM8af82.exe 2560 VJ0bu40.exe 2560 VJ0bu40.exe 2560 VJ0bu40.exe 2364 1BY19ac0.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zF9oD24.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" cM8af82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" VJ0bu40.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2364 set thread context of 2684 2364 1BY19ac0.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2364 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2684 AppLaunch.exe 2684 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2684 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2832 wrote to memory of 1884 2832 NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe 28 PID 2832 wrote to memory of 1884 2832 NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe 28 PID 2832 wrote to memory of 1884 2832 NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe 28 PID 2832 wrote to memory of 1884 2832 NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe 28 PID 2832 wrote to memory of 1884 2832 NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe 28 PID 2832 wrote to memory of 1884 2832 NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe 28 PID 2832 wrote to memory of 1884 2832 NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe 28 PID 1884 wrote to memory of 2640 1884 zF9oD24.exe 29 PID 1884 wrote to memory of 2640 1884 zF9oD24.exe 29 PID 1884 wrote to memory of 2640 1884 zF9oD24.exe 29 PID 1884 wrote to memory of 2640 1884 zF9oD24.exe 29 PID 1884 wrote to memory of 2640 1884 zF9oD24.exe 29 PID 1884 wrote to memory of 2640 1884 zF9oD24.exe 29 PID 1884 wrote to memory of 2640 1884 zF9oD24.exe 29 PID 2640 wrote to memory of 2560 2640 cM8af82.exe 30 PID 2640 wrote to memory of 2560 2640 cM8af82.exe 30 PID 2640 wrote to memory of 2560 2640 cM8af82.exe 30 PID 2640 wrote to memory of 2560 2640 cM8af82.exe 30 PID 2640 wrote to memory of 2560 2640 cM8af82.exe 30 PID 2640 wrote to memory of 2560 2640 cM8af82.exe 30 PID 2640 wrote to memory of 2560 2640 cM8af82.exe 30 PID 2560 wrote to memory of 2364 2560 VJ0bu40.exe 31 PID 2560 wrote to memory of 2364 2560 VJ0bu40.exe 31 PID 2560 wrote to memory of 2364 2560 VJ0bu40.exe 31 PID 2560 wrote to memory of 2364 2560 VJ0bu40.exe 31 PID 2560 wrote to memory of 2364 2560 VJ0bu40.exe 31 PID 2560 wrote to memory of 2364 2560 VJ0bu40.exe 31 PID 2560 wrote to memory of 2364 2560 VJ0bu40.exe 31 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2684 2364 1BY19ac0.exe 32 PID 2364 wrote to memory of 2700 2364 1BY19ac0.exe 33 PID 2364 wrote to memory of 2700 2364 1BY19ac0.exe 33 PID 2364 wrote to memory of 2700 2364 1BY19ac0.exe 33 PID 2364 wrote to memory of 2700 2364 1BY19ac0.exe 33 PID 2364 wrote to memory of 2700 2364 1BY19ac0.exe 33 PID 2364 wrote to memory of 2700 2364 1BY19ac0.exe 33 PID 2364 wrote to memory of 2700 2364 1BY19ac0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEAScde2e1845435e14d8580d0e15264eecb234c7bb7e289abc71dd5f07f17a53d0fexeexe_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zF9oD24.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zF9oD24.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cM8af82.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cM8af82.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VJ0bu40.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VJ0bu40.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1BY19ac0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1BY19ac0.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2700
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
739KB
MD50bcaa7aaf0bb8080546bfc24a78bec3a
SHA153516809fc58166a8aaf350e6497d30da4f332a3
SHA256612f95cc2ee9d066d291cbdafd72972d1adacd51c07aabe648601cfa6047fefd
SHA51209b2be49ca17f9bd0b3a6a2cbed5687164b8a7664e457700e7f5e60f1c63db9c08a83eed889a657f8b8cdfdc261384682e68734c8bfee4a5e5df3ae90ce48953
-
Filesize
739KB
MD50bcaa7aaf0bb8080546bfc24a78bec3a
SHA153516809fc58166a8aaf350e6497d30da4f332a3
SHA256612f95cc2ee9d066d291cbdafd72972d1adacd51c07aabe648601cfa6047fefd
SHA51209b2be49ca17f9bd0b3a6a2cbed5687164b8a7664e457700e7f5e60f1c63db9c08a83eed889a657f8b8cdfdc261384682e68734c8bfee4a5e5df3ae90ce48953
-
Filesize
503KB
MD5a922c300ae424aa07a1ebee00e1e3b6d
SHA16209d672343529522b81b1ef6bb4e96138ac7020
SHA256dcbb197508e5dcdce4002ed5f9ed5573eb6382beef600187de5baaaefe4ba859
SHA5123f3f01b3aa0d4706856edd52340f4319dc5cacb8f88368116ac803ccb5435de7c499df78b376b21d4b1cfb3074eda3400edaa60a2bafcee1d7e1ee2c2297b6ed
-
Filesize
503KB
MD5a922c300ae424aa07a1ebee00e1e3b6d
SHA16209d672343529522b81b1ef6bb4e96138ac7020
SHA256dcbb197508e5dcdce4002ed5f9ed5573eb6382beef600187de5baaaefe4ba859
SHA5123f3f01b3aa0d4706856edd52340f4319dc5cacb8f88368116ac803ccb5435de7c499df78b376b21d4b1cfb3074eda3400edaa60a2bafcee1d7e1ee2c2297b6ed
-
Filesize
317KB
MD52c5926712c8145c25e2675f133c87c41
SHA14b0f973aedef36934a12ed638dfc3e7f0b568112
SHA256b24e634482ecb33664f777634bd1c5e2e395dfa06b541e0b890e91f66d7524a8
SHA51261cb9a3819f7be231b23c5af2fac92c97e7ce91e94665385d78ab14392be268f183f4fdc02eb371021ef10ecab0a49fa35db8c85d89781e677e2637ae2568163
-
Filesize
317KB
MD52c5926712c8145c25e2675f133c87c41
SHA14b0f973aedef36934a12ed638dfc3e7f0b568112
SHA256b24e634482ecb33664f777634bd1c5e2e395dfa06b541e0b890e91f66d7524a8
SHA51261cb9a3819f7be231b23c5af2fac92c97e7ce91e94665385d78ab14392be268f183f4fdc02eb371021ef10ecab0a49fa35db8c85d89781e677e2637ae2568163
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
739KB
MD50bcaa7aaf0bb8080546bfc24a78bec3a
SHA153516809fc58166a8aaf350e6497d30da4f332a3
SHA256612f95cc2ee9d066d291cbdafd72972d1adacd51c07aabe648601cfa6047fefd
SHA51209b2be49ca17f9bd0b3a6a2cbed5687164b8a7664e457700e7f5e60f1c63db9c08a83eed889a657f8b8cdfdc261384682e68734c8bfee4a5e5df3ae90ce48953
-
Filesize
739KB
MD50bcaa7aaf0bb8080546bfc24a78bec3a
SHA153516809fc58166a8aaf350e6497d30da4f332a3
SHA256612f95cc2ee9d066d291cbdafd72972d1adacd51c07aabe648601cfa6047fefd
SHA51209b2be49ca17f9bd0b3a6a2cbed5687164b8a7664e457700e7f5e60f1c63db9c08a83eed889a657f8b8cdfdc261384682e68734c8bfee4a5e5df3ae90ce48953
-
Filesize
503KB
MD5a922c300ae424aa07a1ebee00e1e3b6d
SHA16209d672343529522b81b1ef6bb4e96138ac7020
SHA256dcbb197508e5dcdce4002ed5f9ed5573eb6382beef600187de5baaaefe4ba859
SHA5123f3f01b3aa0d4706856edd52340f4319dc5cacb8f88368116ac803ccb5435de7c499df78b376b21d4b1cfb3074eda3400edaa60a2bafcee1d7e1ee2c2297b6ed
-
Filesize
503KB
MD5a922c300ae424aa07a1ebee00e1e3b6d
SHA16209d672343529522b81b1ef6bb4e96138ac7020
SHA256dcbb197508e5dcdce4002ed5f9ed5573eb6382beef600187de5baaaefe4ba859
SHA5123f3f01b3aa0d4706856edd52340f4319dc5cacb8f88368116ac803ccb5435de7c499df78b376b21d4b1cfb3074eda3400edaa60a2bafcee1d7e1ee2c2297b6ed
-
Filesize
317KB
MD52c5926712c8145c25e2675f133c87c41
SHA14b0f973aedef36934a12ed638dfc3e7f0b568112
SHA256b24e634482ecb33664f777634bd1c5e2e395dfa06b541e0b890e91f66d7524a8
SHA51261cb9a3819f7be231b23c5af2fac92c97e7ce91e94665385d78ab14392be268f183f4fdc02eb371021ef10ecab0a49fa35db8c85d89781e677e2637ae2568163
-
Filesize
317KB
MD52c5926712c8145c25e2675f133c87c41
SHA14b0f973aedef36934a12ed638dfc3e7f0b568112
SHA256b24e634482ecb33664f777634bd1c5e2e395dfa06b541e0b890e91f66d7524a8
SHA51261cb9a3819f7be231b23c5af2fac92c97e7ce91e94665385d78ab14392be268f183f4fdc02eb371021ef10ecab0a49fa35db8c85d89781e677e2637ae2568163
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c