Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.07c31b8c9477c36c80c6a555832b3be0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.07c31b8c9477c36c80c6a555832b3be0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.07c31b8c9477c36c80c6a555832b3be0.exe
-
Size
1.7MB
-
MD5
07c31b8c9477c36c80c6a555832b3be0
-
SHA1
258d6bd264632b95a07c5c45dc90883fd9efa62b
-
SHA256
de769c7b39d44bd9bd3ebb02e12e49c90ab4e55ac0de000096fb6841c14df4d2
-
SHA512
f63d9fea4aa689cb2178405254db8b0f75f11221e35eeaba88f9f71445d9f727e68763f6ab9eb0b01e19032ab6390f45a21e687c2fca0105dfbc1b3596a502a7
-
SSDEEP
49152:MtIWcS4neHbyfYTOYKObutmkO+wAOInO4XrztygxLHkJE4VBq:MtqS4neHYs+wE9XD8VBq
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2856 MSWDM.EXE 2948 MSWDM.EXE 2796 NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE 2676 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2948 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.07c31b8c9477c36c80c6a555832b3be0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.07c31b8c9477c36c80c6a555832b3be0.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.07c31b8c9477c36c80c6a555832b3be0.exe File opened for modification C:\Windows\dev4921.tmp NEAS.07c31b8c9477c36c80c6a555832b3be0.exe File opened for modification C:\Windows\dev4921.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2948 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2856 2192 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 28 PID 2192 wrote to memory of 2856 2192 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 28 PID 2192 wrote to memory of 2856 2192 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 28 PID 2192 wrote to memory of 2856 2192 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 28 PID 2192 wrote to memory of 2948 2192 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 29 PID 2192 wrote to memory of 2948 2192 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 29 PID 2192 wrote to memory of 2948 2192 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 29 PID 2192 wrote to memory of 2948 2192 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 29 PID 2948 wrote to memory of 2796 2948 MSWDM.EXE 30 PID 2948 wrote to memory of 2796 2948 MSWDM.EXE 30 PID 2948 wrote to memory of 2796 2948 MSWDM.EXE 30 PID 2948 wrote to memory of 2796 2948 MSWDM.EXE 30 PID 2948 wrote to memory of 2676 2948 MSWDM.EXE 31 PID 2948 wrote to memory of 2676 2948 MSWDM.EXE 31 PID 2948 wrote to memory of 2676 2948 MSWDM.EXE 31 PID 2948 wrote to memory of 2676 2948 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2856
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev4921.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE
- Executes dropped EXE
PID:2796
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev4921.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD570c95e3b08e52e0458dc9f857403b5b9
SHA16f4e905c446c24d9877132c96f31137d498f3ecc
SHA256ab8de084c95b8bc0bd31125a381716c6df151d15ebf58cbcc2eb69753a5d716d
SHA512cca4a393837c8ad921592cde915ab3fb2389f3e80862b96952e4591cc097db05bcaea99a36dcbe8fcbc3fbb0facd7e8626066f530ed27bedabd3531ec29de112
-
Filesize
1.7MB
MD570c95e3b08e52e0458dc9f857403b5b9
SHA16f4e905c446c24d9877132c96f31137d498f3ecc
SHA256ab8de084c95b8bc0bd31125a381716c6df151d15ebf58cbcc2eb69753a5d716d
SHA512cca4a393837c8ad921592cde915ab3fb2389f3e80862b96952e4591cc097db05bcaea99a36dcbe8fcbc3fbb0facd7e8626066f530ed27bedabd3531ec29de112
-
Filesize
794KB
MD5c6d0721e9156eb2a40a04bb38be0b2a5
SHA1d0a3fcb3ad9f227a02d30abb767883b42fecc3a7
SHA2562435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d
SHA512e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4
-
Filesize
960KB
MD5808de4b2bfdad481ba9f4e153093b250
SHA19a9ab72e76755d30978b589c9c2c138c5ba7ec65
SHA2565adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692
SHA512c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab
-
Filesize
960KB
MD5808de4b2bfdad481ba9f4e153093b250
SHA19a9ab72e76755d30978b589c9c2c138c5ba7ec65
SHA2565adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692
SHA512c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab
-
Filesize
960KB
MD5808de4b2bfdad481ba9f4e153093b250
SHA19a9ab72e76755d30978b589c9c2c138c5ba7ec65
SHA2565adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692
SHA512c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab
-
Filesize
960KB
MD5808de4b2bfdad481ba9f4e153093b250
SHA19a9ab72e76755d30978b589c9c2c138c5ba7ec65
SHA2565adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692
SHA512c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab
-
Filesize
960KB
MD5808de4b2bfdad481ba9f4e153093b250
SHA19a9ab72e76755d30978b589c9c2c138c5ba7ec65
SHA2565adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692
SHA512c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab
-
Filesize
794KB
MD5c6d0721e9156eb2a40a04bb38be0b2a5
SHA1d0a3fcb3ad9f227a02d30abb767883b42fecc3a7
SHA2562435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d
SHA512e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4
-
Filesize
794KB
MD5c6d0721e9156eb2a40a04bb38be0b2a5
SHA1d0a3fcb3ad9f227a02d30abb767883b42fecc3a7
SHA2562435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d
SHA512e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4