Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8199b628a8ebb1957638a02b1ed102b9.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8199b628a8ebb1957638a02b1ed102b9.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.8199b628a8ebb1957638a02b1ed102b9.exe
-
Size
215KB
-
MD5
8199b628a8ebb1957638a02b1ed102b9
-
SHA1
e279629fd5eb9c2afbb0c7862e1c837cf3737b41
-
SHA256
c03ccacccc527516dc721ce99a374e66ca6ea208f6373ebfe2c0e56b8802ae02
-
SHA512
0792ed0d4a5d9c8bebecae583a1f1a76864c1b0b9a5cd9e376cbe011e19534a96c283e1410a34e84227bdb57b5baf4bdc11ca619c029fc08c7b02197b7dc1696
-
SSDEEP
3072:woAbvJrZ/CEp1Td3INNAILgwKRpP3fJ2pwLAt/iw1JmWTe1eyfLUH+xW6Lyk:w7vJN/CE/TZINiPPBIwcuWTegi9W
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1404 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\dba84f48 = "C:\\Windows\\apppatch\\svchost.exe" NEAS.8199b628a8ebb1957638a02b1ed102b9.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\purylev.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyhub.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyvyxor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pumyjig.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\puzylyp.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe NEAS.8199b628a8ebb1957638a02b1ed102b9.exe File created C:\Windows\apppatch\svchost.exe NEAS.8199b628a8ebb1957638a02b1ed102b9.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe 1404 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4052 NEAS.8199b628a8ebb1957638a02b1ed102b9.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4052 NEAS.8199b628a8ebb1957638a02b1ed102b9.exe Token: SeSecurityPrivilege 4052 NEAS.8199b628a8ebb1957638a02b1ed102b9.exe Token: SeSecurityPrivilege 1404 svchost.exe Token: SeSecurityPrivilege 1404 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4052 wrote to memory of 1404 4052 NEAS.8199b628a8ebb1957638a02b1ed102b9.exe 89 PID 4052 wrote to memory of 1404 4052 NEAS.8199b628a8ebb1957638a02b1ed102b9.exe 89 PID 4052 wrote to memory of 1404 4052 NEAS.8199b628a8ebb1957638a02b1ed102b9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8199b628a8ebb1957638a02b1ed102b9.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8199b628a8ebb1957638a02b1ed102b9.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
215KB
MD57e2eb13c1c003935eccb74a844333c63
SHA1536cdf6f69479bb888ebaaedec5da6e4f03be466
SHA2560d2bbeb982e1392f0830b2c0827ef13cabc5fa20d0ec31fe939eddfc0511f1c8
SHA51209430a5ee50b776cc780c755aa43a8b05b8d1f27e6adececfdd81c10dded7a2f499da6d75e87d9203fc15a874afa138ee9c8d3646697e2573c071716b754cce5
-
Filesize
215KB
MD57e2eb13c1c003935eccb74a844333c63
SHA1536cdf6f69479bb888ebaaedec5da6e4f03be466
SHA2560d2bbeb982e1392f0830b2c0827ef13cabc5fa20d0ec31fe939eddfc0511f1c8
SHA51209430a5ee50b776cc780c755aa43a8b05b8d1f27e6adececfdd81c10dded7a2f499da6d75e87d9203fc15a874afa138ee9c8d3646697e2573c071716b754cce5