Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe
-
Size
330KB
-
MD5
ce3f1b889ef5a3096df9b495cb3dbc60
-
SHA1
dfa8415b8eb18fd23a8b99976ebae8ade623db42
-
SHA256
d130b8171d2abaede40d227d28ae55f8f4bf06b7c6a49799585ff0a69dbde865
-
SHA512
4278dc30eec2ad9814cc2773ff3134e851c3a873d26a4dc0367b21293a0470ac63655d6bcf007ef04c73d8198e65942fe10d1dda43b589abc2dd224586c9e430
-
SSDEEP
6144:Koy+bnr+mp0yN90QEWOw4f+8LkEo7jPlfFi+XwkElviB2DUjqE96:0Mrey90cOenEo7jPBFi+gRAADUj996
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
Executes dropped EXE 2 IoCs
pid Process 1420 1Wu53gc8.exe 3488 2Go4738.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1420 set thread context of 2584 1420 1Wu53gc8.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 4700 1420 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2584 AppLaunch.exe 2584 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2584 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1420 4692 NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe 83 PID 4692 wrote to memory of 1420 4692 NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe 83 PID 4692 wrote to memory of 1420 4692 NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe 83 PID 1420 wrote to memory of 836 1420 1Wu53gc8.exe 84 PID 1420 wrote to memory of 836 1420 1Wu53gc8.exe 84 PID 1420 wrote to memory of 836 1420 1Wu53gc8.exe 84 PID 1420 wrote to memory of 2584 1420 1Wu53gc8.exe 85 PID 1420 wrote to memory of 2584 1420 1Wu53gc8.exe 85 PID 1420 wrote to memory of 2584 1420 1Wu53gc8.exe 85 PID 1420 wrote to memory of 2584 1420 1Wu53gc8.exe 85 PID 1420 wrote to memory of 2584 1420 1Wu53gc8.exe 85 PID 1420 wrote to memory of 2584 1420 1Wu53gc8.exe 85 PID 1420 wrote to memory of 2584 1420 1Wu53gc8.exe 85 PID 1420 wrote to memory of 2584 1420 1Wu53gc8.exe 85 PID 4692 wrote to memory of 3488 4692 NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe 90 PID 4692 wrote to memory of 3488 4692 NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe 90 PID 4692 wrote to memory of 3488 4692 NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ce3f1b889ef5a3096df9b495cb3dbc60.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Wu53gc8.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Wu53gc8.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 6003⤵
- Program crash
PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2Go4738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2Go4738.exe2⤵
- Executes dropped EXE
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1420 -ip 14201⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e