Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.07c31b8c9477c36c80c6a555832b3be0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.07c31b8c9477c36c80c6a555832b3be0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.07c31b8c9477c36c80c6a555832b3be0.exe
-
Size
1.7MB
-
MD5
07c31b8c9477c36c80c6a555832b3be0
-
SHA1
258d6bd264632b95a07c5c45dc90883fd9efa62b
-
SHA256
de769c7b39d44bd9bd3ebb02e12e49c90ab4e55ac0de000096fb6841c14df4d2
-
SHA512
f63d9fea4aa689cb2178405254db8b0f75f11221e35eeaba88f9f71445d9f727e68763f6ab9eb0b01e19032ab6390f45a21e687c2fca0105dfbc1b3596a502a7
-
SSDEEP
49152:MtIWcS4neHbyfYTOYKObutmkO+wAOInO4XrztygxLHkJE4VBq:MtqS4neHYs+wE9XD8VBq
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4556 MSWDM.EXE 2016 MSWDM.EXE 1932 NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE 4904 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.07c31b8c9477c36c80c6a555832b3be0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.07c31b8c9477c36c80c6a555832b3be0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.07c31b8c9477c36c80c6a555832b3be0.exe File opened for modification C:\Windows\devBBCE.tmp NEAS.07c31b8c9477c36c80c6a555832b3be0.exe File opened for modification C:\Windows\devBBCE.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2016 MSWDM.EXE 2016 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4596 wrote to memory of 4556 4596 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 87 PID 4596 wrote to memory of 4556 4596 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 87 PID 4596 wrote to memory of 4556 4596 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 87 PID 4596 wrote to memory of 2016 4596 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 88 PID 4596 wrote to memory of 2016 4596 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 88 PID 4596 wrote to memory of 2016 4596 NEAS.07c31b8c9477c36c80c6a555832b3be0.exe 88 PID 2016 wrote to memory of 1932 2016 MSWDM.EXE 90 PID 2016 wrote to memory of 1932 2016 MSWDM.EXE 90 PID 2016 wrote to memory of 1932 2016 MSWDM.EXE 90 PID 2016 wrote to memory of 4904 2016 MSWDM.EXE 91 PID 2016 wrote to memory of 4904 2016 MSWDM.EXE 91 PID 2016 wrote to memory of 4904 2016 MSWDM.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4556
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devBBCE.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE
- Executes dropped EXE
PID:1932
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devBBCE.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD50e458622b587294b3f27585fae69d018
SHA1fdb609bf159a042da5ebbf41a458a9db367a2f35
SHA256ebfc5bc23fb22ec2cbf2f730f498fad5055cc283efcffbfce8afbebd8e01458b
SHA512767775131c747d6956a16aada9f99a28d6811aacae273e36afc17f2a99cd9c2ca7bfd119ac213b1bc31d58f2cfdac226d9d924043e736ee7daccbf8ccfcfd249
-
Filesize
1.7MB
MD50e458622b587294b3f27585fae69d018
SHA1fdb609bf159a042da5ebbf41a458a9db367a2f35
SHA256ebfc5bc23fb22ec2cbf2f730f498fad5055cc283efcffbfce8afbebd8e01458b
SHA512767775131c747d6956a16aada9f99a28d6811aacae273e36afc17f2a99cd9c2ca7bfd119ac213b1bc31d58f2cfdac226d9d924043e736ee7daccbf8ccfcfd249
-
Filesize
794KB
MD5c6d0721e9156eb2a40a04bb38be0b2a5
SHA1d0a3fcb3ad9f227a02d30abb767883b42fecc3a7
SHA2562435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d
SHA512e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4
-
Filesize
1.7MB
MD50e458622b587294b3f27585fae69d018
SHA1fdb609bf159a042da5ebbf41a458a9db367a2f35
SHA256ebfc5bc23fb22ec2cbf2f730f498fad5055cc283efcffbfce8afbebd8e01458b
SHA512767775131c747d6956a16aada9f99a28d6811aacae273e36afc17f2a99cd9c2ca7bfd119ac213b1bc31d58f2cfdac226d9d924043e736ee7daccbf8ccfcfd249
-
Filesize
960KB
MD5808de4b2bfdad481ba9f4e153093b250
SHA19a9ab72e76755d30978b589c9c2c138c5ba7ec65
SHA2565adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692
SHA512c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab
-
Filesize
960KB
MD5808de4b2bfdad481ba9f4e153093b250
SHA19a9ab72e76755d30978b589c9c2c138c5ba7ec65
SHA2565adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692
SHA512c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab
-
Filesize
960KB
MD5808de4b2bfdad481ba9f4e153093b250
SHA19a9ab72e76755d30978b589c9c2c138c5ba7ec65
SHA2565adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692
SHA512c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab
-
Filesize
960KB
MD5808de4b2bfdad481ba9f4e153093b250
SHA19a9ab72e76755d30978b589c9c2c138c5ba7ec65
SHA2565adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692
SHA512c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab
-
Filesize
794KB
MD5c6d0721e9156eb2a40a04bb38be0b2a5
SHA1d0a3fcb3ad9f227a02d30abb767883b42fecc3a7
SHA2562435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d
SHA512e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4