Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.01b5ab450bde6d113d2396f089efe170.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.01b5ab450bde6d113d2396f089efe170.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.01b5ab450bde6d113d2396f089efe170.exe
-
Size
708KB
-
MD5
01b5ab450bde6d113d2396f089efe170
-
SHA1
d09c5e02107873446e6c77bd3eb168794a1a8cf2
-
SHA256
7cf15cb30faa87f5ca12ceca72c3634db0d0095422d1ddbffc0804a5d059af71
-
SHA512
01d84cc377b720e074c929a3e4f25cad97fd856ff709812d6d91047558e258812f29bb6602f11453b4c2bbd00b24edb34ebeb31a6af55cae559a1e62e6d97bc6
-
SSDEEP
12288:phJ6nTOYREHEpQQJvKPSwvY1fHTHy90w6O:phJ6nTOYKHEpQQJvKPzvYZHTHy7b
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1840 MSWDM.EXE 2104 MSWDM.EXE 3036 NEAS.01B5AB450BDE6D113D2396F089EFE170.EXE 2292 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2104 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.01b5ab450bde6d113d2396f089efe170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.01b5ab450bde6d113d2396f089efe170.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\devA14E.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE NEAS.01b5ab450bde6d113d2396f089efe170.exe File opened for modification C:\Windows\devA14E.tmp NEAS.01b5ab450bde6d113d2396f089efe170.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2104 MSWDM.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1840 1668 NEAS.01b5ab450bde6d113d2396f089efe170.exe 29 PID 1668 wrote to memory of 1840 1668 NEAS.01b5ab450bde6d113d2396f089efe170.exe 29 PID 1668 wrote to memory of 1840 1668 NEAS.01b5ab450bde6d113d2396f089efe170.exe 29 PID 1668 wrote to memory of 1840 1668 NEAS.01b5ab450bde6d113d2396f089efe170.exe 29 PID 1668 wrote to memory of 2104 1668 NEAS.01b5ab450bde6d113d2396f089efe170.exe 28 PID 1668 wrote to memory of 2104 1668 NEAS.01b5ab450bde6d113d2396f089efe170.exe 28 PID 1668 wrote to memory of 2104 1668 NEAS.01b5ab450bde6d113d2396f089efe170.exe 28 PID 1668 wrote to memory of 2104 1668 NEAS.01b5ab450bde6d113d2396f089efe170.exe 28 PID 2104 wrote to memory of 3036 2104 MSWDM.EXE 30 PID 2104 wrote to memory of 3036 2104 MSWDM.EXE 30 PID 2104 wrote to memory of 3036 2104 MSWDM.EXE 30 PID 2104 wrote to memory of 3036 2104 MSWDM.EXE 30 PID 2104 wrote to memory of 3036 2104 MSWDM.EXE 30 PID 2104 wrote to memory of 3036 2104 MSWDM.EXE 30 PID 2104 wrote to memory of 3036 2104 MSWDM.EXE 30 PID 2104 wrote to memory of 2292 2104 MSWDM.EXE 31 PID 2104 wrote to memory of 2292 2104 MSWDM.EXE 31 PID 2104 wrote to memory of 2292 2104 MSWDM.EXE 31 PID 2104 wrote to memory of 2292 2104 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.01b5ab450bde6d113d2396f089efe170.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.01b5ab450bde6d113d2396f089efe170.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devA14E.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.01b5ab450bde6d113d2396f089efe170.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\NEAS.01B5AB450BDE6D113D2396F089EFE170.EXE
- Executes dropped EXE
PID:3036
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devA14E.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.01B5AB450BDE6D113D2396F089EFE170.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2292
-
-
-
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
708KB
MD56632fb1b2dae8d43bab638bfbd5ce208
SHA1f45bd0db2eb72bc1b365ccb6cd33be9f9fa79a42
SHA2560a795f84a096fd9bda965a4da44495761fcae7b396a14672715b9317b0759bf7
SHA512d7454bbdd504e134316ee6434806fc3d75fa017cd3d3ca3816dc89964c5ea8434b3c2b97c7299c36d2bd52879489adeafcc203a94936c0182ecb1a5cf7eb92b4
-
Filesize
708KB
MD56632fb1b2dae8d43bab638bfbd5ce208
SHA1f45bd0db2eb72bc1b365ccb6cd33be9f9fa79a42
SHA2560a795f84a096fd9bda965a4da44495761fcae7b396a14672715b9317b0759bf7
SHA512d7454bbdd504e134316ee6434806fc3d75fa017cd3d3ca3816dc89964c5ea8434b3c2b97c7299c36d2bd52879489adeafcc203a94936c0182ecb1a5cf7eb92b4
-
Filesize
452KB
MD595b8a4245a6cd37d36e56fae5a23e2b1
SHA1139e0223e64a2d4f7ae94e347c657bdb86dfd5ff
SHA256e69c4abcc4d2f130e66560fc27829b4fe62a2b1f66933790a3060bd7f4fcd878
SHA5129114af555b9d97c87834982c80d9a4a7cc97b8678ed55d96a1a02999b551e9e018d376b404d0925bbb87dcd2aa8e0fa8bf7745f60096a7df01cd918002fb0bf1
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
452KB
MD595b8a4245a6cd37d36e56fae5a23e2b1
SHA1139e0223e64a2d4f7ae94e347c657bdb86dfd5ff
SHA256e69c4abcc4d2f130e66560fc27829b4fe62a2b1f66933790a3060bd7f4fcd878
SHA5129114af555b9d97c87834982c80d9a4a7cc97b8678ed55d96a1a02999b551e9e018d376b404d0925bbb87dcd2aa8e0fa8bf7745f60096a7df01cd918002fb0bf1
-
Filesize
452KB
MD595b8a4245a6cd37d36e56fae5a23e2b1
SHA1139e0223e64a2d4f7ae94e347c657bdb86dfd5ff
SHA256e69c4abcc4d2f130e66560fc27829b4fe62a2b1f66933790a3060bd7f4fcd878
SHA5129114af555b9d97c87834982c80d9a4a7cc97b8678ed55d96a1a02999b551e9e018d376b404d0925bbb87dcd2aa8e0fa8bf7745f60096a7df01cd918002fb0bf1