Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe
-
Size
201KB
-
MD5
8ec6cbc74a6b64ad33239f4a6b8416b0
-
SHA1
c84b9a0906f392fab657b4e57c6510dc3721ff95
-
SHA256
dff6637bf2f141177e628ccccc03f2b903e2fe3dd6ab01273585ff0114674204
-
SHA512
54545ac30aa431ed5079ea9104de65d1221cbf53abda0c7e350068e16eabc641bec549ff2b18af45696dcfda262d7fe9c8e460dd474615c092d9e9bb86281257
-
SSDEEP
6144:ot++Jbojf5Vq5OC4qZhZcKYhc/ZfUozY:L+cff22qZhZcKYhc/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2124 NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe 2124 NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\84905d88 = "C:\\Windows\\apppatch\\svchost.exe" NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\84905d88 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\puzylyp.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\puzylyp.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe File opened for modification C:\Windows\apppatch\svchost.exe NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2208 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2124 NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2208 2124 NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe 28 PID 2124 wrote to memory of 2208 2124 NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe 28 PID 2124 wrote to memory of 2208 2124 NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe 28 PID 2124 wrote to memory of 2208 2124 NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8ec6cbc74a6b64ad33239f4a6b8416b0.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59ee7efb13bd4f6835c9ad4a0cb85b792
SHA15af059be8da511ca995e24232a3f7fe1009cd287
SHA2569fd63fbcec3b709e2e49759c0d50ceadd63c6dd7dd0168a63dd48fd31370b8b4
SHA5126e150d99d09397c405a437cfb654b6a0025294844a9f35a9622f7803503057cbe4a7088760a5b0ab570393501f1f56628edfa7192ecb21b29d71ca56d0355b53
-
Filesize
201KB
MD548e81171e8ad2ff96d5c98146729268e
SHA145303704e1780ddd3b61d39098490a8fbe67c910
SHA25677673adfa049b149bba7bf848e630a6ddee39d128e5fad899d01bae2d75d91cf
SHA51248af7f4761ac92aa4f5217eec7590784918d9fdff3bc1f1f56de13f5ee82236c6379ec25657166f39e751319c07e0dee5dadc0a08eecccf295b2b1e8760e1f6d
-
Filesize
201KB
MD548e81171e8ad2ff96d5c98146729268e
SHA145303704e1780ddd3b61d39098490a8fbe67c910
SHA25677673adfa049b149bba7bf848e630a6ddee39d128e5fad899d01bae2d75d91cf
SHA51248af7f4761ac92aa4f5217eec7590784918d9fdff3bc1f1f56de13f5ee82236c6379ec25657166f39e751319c07e0dee5dadc0a08eecccf295b2b1e8760e1f6d
-
Filesize
201KB
MD548e81171e8ad2ff96d5c98146729268e
SHA145303704e1780ddd3b61d39098490a8fbe67c910
SHA25677673adfa049b149bba7bf848e630a6ddee39d128e5fad899d01bae2d75d91cf
SHA51248af7f4761ac92aa4f5217eec7590784918d9fdff3bc1f1f56de13f5ee82236c6379ec25657166f39e751319c07e0dee5dadc0a08eecccf295b2b1e8760e1f6d
-
Filesize
201KB
MD548e81171e8ad2ff96d5c98146729268e
SHA145303704e1780ddd3b61d39098490a8fbe67c910
SHA25677673adfa049b149bba7bf848e630a6ddee39d128e5fad899d01bae2d75d91cf
SHA51248af7f4761ac92aa4f5217eec7590784918d9fdff3bc1f1f56de13f5ee82236c6379ec25657166f39e751319c07e0dee5dadc0a08eecccf295b2b1e8760e1f6d
-
Filesize
201KB
MD548e81171e8ad2ff96d5c98146729268e
SHA145303704e1780ddd3b61d39098490a8fbe67c910
SHA25677673adfa049b149bba7bf848e630a6ddee39d128e5fad899d01bae2d75d91cf
SHA51248af7f4761ac92aa4f5217eec7590784918d9fdff3bc1f1f56de13f5ee82236c6379ec25657166f39e751319c07e0dee5dadc0a08eecccf295b2b1e8760e1f6d