Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.68156d8f04892837d48a172104718820.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.68156d8f04892837d48a172104718820.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.68156d8f04892837d48a172104718820.exe
-
Size
484KB
-
MD5
68156d8f04892837d48a172104718820
-
SHA1
1b32108d25ca5ae79153d3e8dc793a9355e61692
-
SHA256
7e59224a8fb8f5fa418327b533fd011a35cd1130a22a51278b1a2a1d765500af
-
SHA512
31af38ae359ed764bb420977f62d687b7041212e9014d26c8244ab6490d30bb15f664bdbf088ea11bf283ea9e7d88d00953ee35264b19abf909533a777d820ec
-
SSDEEP
12288:vLPkCDt1EG2XVekhdeTe30yNE/1R4e7FJL97qepxlk:vLPkQ1bqAG30D/1777LMkxi
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2392 compPING.exe 2288 ~5725.tmp 2820 fingeown.exe -
Loads dropped DLL 3 IoCs
pid Process 2264 NEAS.68156d8f04892837d48a172104718820.exe 2264 NEAS.68156d8f04892837d48a172104718820.exe 2392 compPING.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundup16 = "C:\\Users\\Admin\\AppData\\Roaming\\cmdkvr32\\compPING.exe" NEAS.68156d8f04892837d48a172104718820.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\fingeown.exe NEAS.68156d8f04892837d48a172104718820.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2812 2264 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 compPING.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE 2820 fingeown.exe 1204 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1204 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2392 compPING.exe Token: SeShutdownPrivilege 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2392 2264 NEAS.68156d8f04892837d48a172104718820.exe 28 PID 2264 wrote to memory of 2392 2264 NEAS.68156d8f04892837d48a172104718820.exe 28 PID 2264 wrote to memory of 2392 2264 NEAS.68156d8f04892837d48a172104718820.exe 28 PID 2264 wrote to memory of 2392 2264 NEAS.68156d8f04892837d48a172104718820.exe 28 PID 2392 wrote to memory of 2288 2392 compPING.exe 29 PID 2392 wrote to memory of 2288 2392 compPING.exe 29 PID 2392 wrote to memory of 2288 2392 compPING.exe 29 PID 2392 wrote to memory of 2288 2392 compPING.exe 29 PID 2288 wrote to memory of 1204 2288 ~5725.tmp 17 PID 2264 wrote to memory of 2812 2264 NEAS.68156d8f04892837d48a172104718820.exe 31 PID 2264 wrote to memory of 2812 2264 NEAS.68156d8f04892837d48a172104718820.exe 31 PID 2264 wrote to memory of 2812 2264 NEAS.68156d8f04892837d48a172104718820.exe 31 PID 2264 wrote to memory of 2812 2264 NEAS.68156d8f04892837d48a172104718820.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\NEAS.68156d8f04892837d48a172104718820.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.68156d8f04892837d48a172104718820.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\cmdkvr32\compPING.exe"C:\Users\Admin\AppData\Roaming\cmdkvr32"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\~5725.tmp1204 496136 2392 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 2523⤵
- Program crash
PID:2812
-
-
-
C:\Windows\SysWOW64\fingeown.exeC:\Windows\SysWOW64\fingeown.exe -s1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
484KB
MD5d84deeeb68cf62f7cf7de728d0e99387
SHA11c2808633bb963eac3d9c10d781617d23ca64794
SHA256efa4851416ad703e1fd85a2b351e4e03833948d54ee1520b2628cb75e2b29bc8
SHA512727df7ebce7cc9b5a280b92b25a3dce8fcf97e8a0cd0ba9486426cba3076d818d1b804adc1aae289ac0123379fdd87f98797a33a3d8da68014ba470f9df59198
-
Filesize
484KB
MD5d84deeeb68cf62f7cf7de728d0e99387
SHA11c2808633bb963eac3d9c10d781617d23ca64794
SHA256efa4851416ad703e1fd85a2b351e4e03833948d54ee1520b2628cb75e2b29bc8
SHA512727df7ebce7cc9b5a280b92b25a3dce8fcf97e8a0cd0ba9486426cba3076d818d1b804adc1aae289ac0123379fdd87f98797a33a3d8da68014ba470f9df59198
-
Filesize
484KB
MD5d84deeeb68cf62f7cf7de728d0e99387
SHA11c2808633bb963eac3d9c10d781617d23ca64794
SHA256efa4851416ad703e1fd85a2b351e4e03833948d54ee1520b2628cb75e2b29bc8
SHA512727df7ebce7cc9b5a280b92b25a3dce8fcf97e8a0cd0ba9486426cba3076d818d1b804adc1aae289ac0123379fdd87f98797a33a3d8da68014ba470f9df59198
-
Filesize
484KB
MD5d84deeeb68cf62f7cf7de728d0e99387
SHA11c2808633bb963eac3d9c10d781617d23ca64794
SHA256efa4851416ad703e1fd85a2b351e4e03833948d54ee1520b2628cb75e2b29bc8
SHA512727df7ebce7cc9b5a280b92b25a3dce8fcf97e8a0cd0ba9486426cba3076d818d1b804adc1aae289ac0123379fdd87f98797a33a3d8da68014ba470f9df59198
-
Filesize
484KB
MD5d84deeeb68cf62f7cf7de728d0e99387
SHA11c2808633bb963eac3d9c10d781617d23ca64794
SHA256efa4851416ad703e1fd85a2b351e4e03833948d54ee1520b2628cb75e2b29bc8
SHA512727df7ebce7cc9b5a280b92b25a3dce8fcf97e8a0cd0ba9486426cba3076d818d1b804adc1aae289ac0123379fdd87f98797a33a3d8da68014ba470f9df59198
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
484KB
MD5d84deeeb68cf62f7cf7de728d0e99387
SHA11c2808633bb963eac3d9c10d781617d23ca64794
SHA256efa4851416ad703e1fd85a2b351e4e03833948d54ee1520b2628cb75e2b29bc8
SHA512727df7ebce7cc9b5a280b92b25a3dce8fcf97e8a0cd0ba9486426cba3076d818d1b804adc1aae289ac0123379fdd87f98797a33a3d8da68014ba470f9df59198
-
Filesize
484KB
MD5d84deeeb68cf62f7cf7de728d0e99387
SHA11c2808633bb963eac3d9c10d781617d23ca64794
SHA256efa4851416ad703e1fd85a2b351e4e03833948d54ee1520b2628cb75e2b29bc8
SHA512727df7ebce7cc9b5a280b92b25a3dce8fcf97e8a0cd0ba9486426cba3076d818d1b804adc1aae289ac0123379fdd87f98797a33a3d8da68014ba470f9df59198