Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.887b7c81aeee919f91674242908faf60.dll
Resource
win7-20231020-en
General
-
Target
NEAS.887b7c81aeee919f91674242908faf60.dll
-
Size
499KB
-
MD5
887b7c81aeee919f91674242908faf60
-
SHA1
25b63685ae6a634e6299e127bbf04d09be158f3b
-
SHA256
503e5ef63636254bb35f7c79da99d83e773e5fd8f0217c861f95bd551f28c244
-
SHA512
7fff463cdc11038786ff956caed5889458604c33eb4693c27e4921ed5d69b7e9cf86c90eb6ab31ae63afb4ef751a059aa1195e2ab81b131b25f8dd0297cc6838
-
SSDEEP
12288:jLAqg0CqojLWyvfTVkzp42wpCq5fIuDLhsz9ULR:jLzg0DwLWyvb2zp4FpCWVhsz9UL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1700 4F77.tmp -
Loads dropped DLL 2 IoCs
pid Process 1688 rundll32.exe 1688 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDSF.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEEX.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MCPS.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1XTOR.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FSTOCK.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7EN.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\MSGR3EN.DLL 4F77.tmp File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TWCUTCHR.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\EScript.api 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FPERSON.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUTHZAX.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\DESKSAM.SAM 4F77.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search.api 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDS.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLSLICER.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IMPMAIL.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLMIME.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceca35.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\sqlite.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\WebKit.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VVIEWDWG.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msolap100.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OWSCLT.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMSMDB32.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX8.x3d 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\VBAJET32.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORES.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLPH.DLL 4F77.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeUpdater.dll 4F77.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\atl.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia.api 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACERCLR.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONWordAddin.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\WTSP61MS.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ContactPicker.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\oisctrl.dll 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOCFU.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\URLREDIR.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\UmOutlookAddin.dll 4F77.tmp File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 4F77.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX9.x3d 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\MSADDNDR.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\FPSRVUTL.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INTLDATE.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OL.SAM 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7ES.DLL 4F77.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msmgdsrv.dll 4F77.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\GAC_32\PresentationCore\3.0.0.0__31bf3856ad364e35\wpfgfx_v0300.dll 4F77.tmp File created C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll 4F77.tmp File created C:\Windows\assembly\GAC_32\System.Data.OracleClient\2.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll 4F77.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 2540 1688 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1688 2276 rundll32.exe 28 PID 2276 wrote to memory of 1688 2276 rundll32.exe 28 PID 2276 wrote to memory of 1688 2276 rundll32.exe 28 PID 2276 wrote to memory of 1688 2276 rundll32.exe 28 PID 2276 wrote to memory of 1688 2276 rundll32.exe 28 PID 2276 wrote to memory of 1688 2276 rundll32.exe 28 PID 2276 wrote to memory of 1688 2276 rundll32.exe 28 PID 1688 wrote to memory of 1700 1688 rundll32.exe 29 PID 1688 wrote to memory of 1700 1688 rundll32.exe 29 PID 1688 wrote to memory of 1700 1688 rundll32.exe 29 PID 1688 wrote to memory of 1700 1688 rundll32.exe 29 PID 1688 wrote to memory of 2540 1688 rundll32.exe 30 PID 1688 wrote to memory of 2540 1688 rundll32.exe 30 PID 1688 wrote to memory of 2540 1688 rundll32.exe 30 PID 1688 wrote to memory of 2540 1688 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.887b7c81aeee919f91674242908faf60.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.887b7c81aeee919f91674242908faf60.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\4F77.tmpC:\Users\Admin\AppData\Local\Temp\4F77.tmp3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 2283⤵
- Program crash
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666