Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24/10/2023, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe
Resource
win7-20231023-en
General
-
Target
NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe
-
Size
6.1MB
-
MD5
632b27dcf43d1b1da88c7480c96c8280
-
SHA1
9b36b147a60f218c06adc8e3526c87cd0f0481b5
-
SHA256
88ec63449ccc66e5b3f69eaaef9bb5a5d276bf087d3abd29c62e448a426b6660
-
SHA512
1f1344ab2b2e2cc0351138081c49d6b6b8eb4d87c7e5e301ea994f565f3eab2bfa90759470d28d2d60a1e78e9691c09229a51bacd37dcc62ce41555f19be4d36
-
SSDEEP
98304:Xws2ANnKXOaeOgmhylS77UQ1mfa/ews4VOp9mP:hKXbeO7olS7oQcfa/ewsWOpsP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2616-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2616-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2616-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2660-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/3064-44-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/3064-47-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/3064-50-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/files/0x000e000000012265-6.dat family_gh0strat behavioral1/memory/2616-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2616-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2616-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2660-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2616-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2660-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/3064-44-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/3064-47-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/3064-50-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
pid Process 2800 R.exe 2616 N.exe 2660 TXPlatfor.exe 3064 TXPlatfor.exe 2680 HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 1276 Process not Found -
Loads dropped DLL 5 IoCs
pid Process 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2800 R.exe 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2660 TXPlatfor.exe 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2616-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2616-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2616-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2616-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2660-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2616-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2660-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/3064-44-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/3064-47-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/3064-50-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\259407791.txt R.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe File opened for modification C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\ShellUI.MST HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2748 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3064 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2616 N.exe Token: SeLoadDriverPrivilege 3064 TXPlatfor.exe Token: 33 3064 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 3064 TXPlatfor.exe Token: 33 3064 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 3064 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2680 HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2680 HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2680 HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2680 HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2680 HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2680 HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 2680 HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2800 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 28 PID 2212 wrote to memory of 2800 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 28 PID 2212 wrote to memory of 2800 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 28 PID 2212 wrote to memory of 2800 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 28 PID 2212 wrote to memory of 2616 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 29 PID 2212 wrote to memory of 2616 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 29 PID 2212 wrote to memory of 2616 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 29 PID 2212 wrote to memory of 2616 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 29 PID 2212 wrote to memory of 2616 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 29 PID 2212 wrote to memory of 2616 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 29 PID 2212 wrote to memory of 2616 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 29 PID 2616 wrote to memory of 2688 2616 N.exe 31 PID 2616 wrote to memory of 2688 2616 N.exe 31 PID 2616 wrote to memory of 2688 2616 N.exe 31 PID 2616 wrote to memory of 2688 2616 N.exe 31 PID 2660 wrote to memory of 3064 2660 TXPlatfor.exe 34 PID 2660 wrote to memory of 3064 2660 TXPlatfor.exe 34 PID 2660 wrote to memory of 3064 2660 TXPlatfor.exe 34 PID 2660 wrote to memory of 3064 2660 TXPlatfor.exe 34 PID 2660 wrote to memory of 3064 2660 TXPlatfor.exe 34 PID 2660 wrote to memory of 3064 2660 TXPlatfor.exe 34 PID 2660 wrote to memory of 3064 2660 TXPlatfor.exe 34 PID 2212 wrote to memory of 2680 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 33 PID 2212 wrote to memory of 2680 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 33 PID 2212 wrote to memory of 2680 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 33 PID 2212 wrote to memory of 2680 2212 NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe 33 PID 2688 wrote to memory of 2748 2688 cmd.exe 35 PID 2688 wrote to memory of 2748 2688 cmd.exe 35 PID 2688 wrote to memory of 2748 2688 cmd.exe 35 PID 2688 wrote to memory of 2748 2688 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exeC:\Users\Admin\AppData\Local\Temp\HD_NEAS.632b27dcf43d1b1da88c7480c96c8280_JC.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD5c84a3c776bf83d55f901288db3b8b8a0
SHA1515df2a9fb35beef25d070b688d692646f0a1c8f
SHA256b8d968872fe7ed8de7eeb89ff6e1ce2029521f7c744c088ae2c4807b396d28ae
SHA512e471e4ffa1511b5239474577eda92ccb98918eb1633284af20ed80a3cd8366dc4b3ecbe2482b9325e6c543b1acf07731973290265b0ac3c94ea6c436b12e9064
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
3.0MB
MD55fb39818ad99ba5bca979e6e6c222850
SHA1b1d3fbcd535100168ac377f140214bc4bf181b2f
SHA2568db26f6cfa3053fb0b391f0604af550f63caf5b2b4a5660651ab7529132952a5
SHA5122770ad67cff69824e49b4fe618460c2ade5f208b1e6e4ebc357818abeb0c4ed29701f1d9f99cb6ccd2a6feb6b4d1c394bdf60701f7ad037a5ded8c4c01135bc2
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
3.7MB
MD5c84a3c776bf83d55f901288db3b8b8a0
SHA1515df2a9fb35beef25d070b688d692646f0a1c8f
SHA256b8d968872fe7ed8de7eeb89ff6e1ce2029521f7c744c088ae2c4807b396d28ae
SHA512e471e4ffa1511b5239474577eda92ccb98918eb1633284af20ed80a3cd8366dc4b3ecbe2482b9325e6c543b1acf07731973290265b0ac3c94ea6c436b12e9064
-
Filesize
3.7MB
MD5c84a3c776bf83d55f901288db3b8b8a0
SHA1515df2a9fb35beef25d070b688d692646f0a1c8f
SHA256b8d968872fe7ed8de7eeb89ff6e1ce2029521f7c744c088ae2c4807b396d28ae
SHA512e471e4ffa1511b5239474577eda92ccb98918eb1633284af20ed80a3cd8366dc4b3ecbe2482b9325e6c543b1acf07731973290265b0ac3c94ea6c436b12e9064
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
899KB
MD5091a848c362577f72aa6adf2b5505ba9
SHA1cf29fc8bdf7fee6a62d8d4e86c79b4b622c38fda
SHA2568a328ad057903cc74c083e90363397ceb953b457164b2e3ea3f0b09658adef27
SHA512bcf6d5914808b411081483f9601cf294005f9718cfa38e2438e1bd76581d568b5dd9d75f5151c74096c5646327df0a886a1b534be64357acf1aed4f738974406
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0