Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2023, 08:39

General

  • Target

    NEAS.8199b628a8ebb1957638a02b1ed102b9.exe

  • Size

    215KB

  • MD5

    8199b628a8ebb1957638a02b1ed102b9

  • SHA1

    e279629fd5eb9c2afbb0c7862e1c837cf3737b41

  • SHA256

    c03ccacccc527516dc721ce99a374e66ca6ea208f6373ebfe2c0e56b8802ae02

  • SHA512

    0792ed0d4a5d9c8bebecae583a1f1a76864c1b0b9a5cd9e376cbe011e19534a96c283e1410a34e84227bdb57b5baf4bdc11ca619c029fc08c7b02197b7dc1696

  • SSDEEP

    3072:woAbvJrZ/CEp1Td3INNAILgwKRpP3fJ2pwLAt/iw1JmWTe1eyfLUH+xW6Lyk:w7vJN/CE/TZINiPPBIwcuWTegi9W

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.8199b628a8ebb1957638a02b1ed102b9.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.8199b628a8ebb1957638a02b1ed102b9.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Low\IE\Y61CGXU2\login[1].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Windows\apppatch\svchost.exe

    Filesize

    215KB

    MD5

    7e2eb13c1c003935eccb74a844333c63

    SHA1

    536cdf6f69479bb888ebaaedec5da6e4f03be466

    SHA256

    0d2bbeb982e1392f0830b2c0827ef13cabc5fa20d0ec31fe939eddfc0511f1c8

    SHA512

    09430a5ee50b776cc780c755aa43a8b05b8d1f27e6adececfdd81c10dded7a2f499da6d75e87d9203fc15a874afa138ee9c8d3646697e2573c071716b754cce5

  • C:\Windows\apppatch\svchost.exe

    Filesize

    215KB

    MD5

    7e2eb13c1c003935eccb74a844333c63

    SHA1

    536cdf6f69479bb888ebaaedec5da6e4f03be466

    SHA256

    0d2bbeb982e1392f0830b2c0827ef13cabc5fa20d0ec31fe939eddfc0511f1c8

    SHA512

    09430a5ee50b776cc780c755aa43a8b05b8d1f27e6adececfdd81c10dded7a2f499da6d75e87d9203fc15a874afa138ee9c8d3646697e2573c071716b754cce5

  • memory/1404-53-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-77-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-15-0x0000000002B20000-0x0000000002BCA000-memory.dmp

    Filesize

    680KB

  • memory/1404-21-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-22-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-23-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-24-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-58-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-26-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-28-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-29-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-27-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-30-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-33-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-34-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-36-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-37-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-39-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-40-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-41-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-45-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-44-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-48-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-50-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-51-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-17-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-19-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-55-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-25-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-59-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-60-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-62-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-61-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-63-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-64-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-65-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-67-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-69-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-70-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-68-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-71-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-72-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-73-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-74-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-75-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-76-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-56-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-79-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-78-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/1404-158-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1404-160-0x0000000002F40000-0x0000000002FF7000-memory.dmp

    Filesize

    732KB

  • memory/4052-0-0x0000000002200000-0x0000000002203000-memory.dmp

    Filesize

    12KB

  • memory/4052-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4052-13-0x0000000002200000-0x0000000002203000-memory.dmp

    Filesize

    12KB

  • memory/4052-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB