Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
265s -
max time network
319s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe
-
Size
386KB
-
MD5
f3c94d5d5f1ebda5b15713e7e56960e8
-
SHA1
f622e8dd591d84301d8039691433dcb5479e0d0a
-
SHA256
58f84d1b9ee39f628c3852b136c62e9a64c0b4f56a40b9c84ce61266687f0594
-
SHA512
5c592759de02bcca141fb119eb8a68dd4f5e84ac7c3cffd1112b9dc26c2a4090ffb8b8a70280056902a33dbb534d6d0fecf8a047c3fd96cced1d5c9a311b9ec6
-
SSDEEP
12288:qwCcJ0X4i0wQZ7287xmPFRkfJg9qwQZ7287xmP:qvk0X0ZZ/aFKm9qZZ/a
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blkgdmbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blkgdmbp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipnigl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ipnigl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe -
Executes dropped EXE 3 IoCs
pid Process 2564 Blkgdmbp.exe 2476 Ipnigl32.exe 2840 Iifnpagn.exe -
Loads dropped DLL 10 IoCs
pid Process 2548 NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe 2548 NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe 2564 Blkgdmbp.exe 2564 Blkgdmbp.exe 2476 Ipnigl32.exe 2476 Ipnigl32.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Blkgdmbp.exe NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe File created C:\Windows\SysWOW64\Ipnigl32.exe Blkgdmbp.exe File opened for modification C:\Windows\SysWOW64\Ipnigl32.exe Blkgdmbp.exe File opened for modification C:\Windows\SysWOW64\Blkgdmbp.exe NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe File created C:\Windows\SysWOW64\Aojbhk32.dll NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe File created C:\Windows\SysWOW64\Nnmeaaiq.dll Blkgdmbp.exe File created C:\Windows\SysWOW64\Iifnpagn.exe Ipnigl32.exe File opened for modification C:\Windows\SysWOW64\Iifnpagn.exe Ipnigl32.exe File created C:\Windows\SysWOW64\Kbebkmci.dll Ipnigl32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2828 2840 WerFault.exe 29 -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Blkgdmbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnmeaaiq.dll" Blkgdmbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ipnigl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbebkmci.dll" Ipnigl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ipnigl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aojbhk32.dll" NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Blkgdmbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2564 2548 NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe 27 PID 2548 wrote to memory of 2564 2548 NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe 27 PID 2548 wrote to memory of 2564 2548 NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe 27 PID 2548 wrote to memory of 2564 2548 NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe 27 PID 2564 wrote to memory of 2476 2564 Blkgdmbp.exe 28 PID 2564 wrote to memory of 2476 2564 Blkgdmbp.exe 28 PID 2564 wrote to memory of 2476 2564 Blkgdmbp.exe 28 PID 2564 wrote to memory of 2476 2564 Blkgdmbp.exe 28 PID 2476 wrote to memory of 2840 2476 Ipnigl32.exe 29 PID 2476 wrote to memory of 2840 2476 Ipnigl32.exe 29 PID 2476 wrote to memory of 2840 2476 Ipnigl32.exe 29 PID 2476 wrote to memory of 2840 2476 Ipnigl32.exe 29 PID 2840 wrote to memory of 2828 2840 Iifnpagn.exe 30 PID 2840 wrote to memory of 2828 2840 Iifnpagn.exe 30 PID 2840 wrote to memory of 2828 2840 Iifnpagn.exe 30 PID 2840 wrote to memory of 2828 2840 Iifnpagn.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f3c94d5d5f1ebda5b15713e7e56960e8.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\Blkgdmbp.exeC:\Windows\system32\Blkgdmbp.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\Ipnigl32.exeC:\Windows\system32\Ipnigl32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\Iifnpagn.exeC:\Windows\system32\Iifnpagn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 1405⤵
- Loads dropped DLL
- Program crash
PID:2828
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5cc7ef4a32d5a91fb76649ccbadb0a58c
SHA158cd81c5809076494df4697e93aa873644ac9231
SHA256c2a1fd2b30902607c55d74e7d1d8891bf3a332f541b432ef5f0b8c5add19d131
SHA5125deb1c35e9c3e0e02c4c6a87724064f8d9be0d34052621512ca3559442d89133b25010c0bc5ae0aec0ae3886aa065e001284f4679044111d7d3187f6dd33d286
-
Filesize
386KB
MD5cc7ef4a32d5a91fb76649ccbadb0a58c
SHA158cd81c5809076494df4697e93aa873644ac9231
SHA256c2a1fd2b30902607c55d74e7d1d8891bf3a332f541b432ef5f0b8c5add19d131
SHA5125deb1c35e9c3e0e02c4c6a87724064f8d9be0d34052621512ca3559442d89133b25010c0bc5ae0aec0ae3886aa065e001284f4679044111d7d3187f6dd33d286
-
Filesize
386KB
MD5cc7ef4a32d5a91fb76649ccbadb0a58c
SHA158cd81c5809076494df4697e93aa873644ac9231
SHA256c2a1fd2b30902607c55d74e7d1d8891bf3a332f541b432ef5f0b8c5add19d131
SHA5125deb1c35e9c3e0e02c4c6a87724064f8d9be0d34052621512ca3559442d89133b25010c0bc5ae0aec0ae3886aa065e001284f4679044111d7d3187f6dd33d286
-
Filesize
386KB
MD50ce8c2d82e092f94983dc4e1d3be2a93
SHA1488747b45b236c3a7c92f3515cba5641a49963f3
SHA25686b367c730fcdafbebd0d3937c80a44a32d2fcbf5cf3510b1b9881213040e8db
SHA512c6c7c35663c2212dbc40a6b776a58704dff301e8973750770648cc6c66013c4f11ac8a5bcf824c8244108f743d27946b09d54eeba55c46085640628298e8636f
-
Filesize
386KB
MD50ce8c2d82e092f94983dc4e1d3be2a93
SHA1488747b45b236c3a7c92f3515cba5641a49963f3
SHA25686b367c730fcdafbebd0d3937c80a44a32d2fcbf5cf3510b1b9881213040e8db
SHA512c6c7c35663c2212dbc40a6b776a58704dff301e8973750770648cc6c66013c4f11ac8a5bcf824c8244108f743d27946b09d54eeba55c46085640628298e8636f
-
Filesize
386KB
MD515c528f85b1772a8461b0179f1ac0375
SHA10d3198b0e0c38a15812fe8a54af536931bf7122a
SHA25627930d95f28115e5c10e48029ebac9f6b88fb99de5a11f7b0a837d615e94a21d
SHA51290834f66f767ed3eafb8535a16298439ab7ea4013f58eccba89df0cf54800ca73e6cd0c0a9be7a41c4ee23eb458c89e6aad34a499fa1ad9a59db045a09e05435
-
Filesize
386KB
MD515c528f85b1772a8461b0179f1ac0375
SHA10d3198b0e0c38a15812fe8a54af536931bf7122a
SHA25627930d95f28115e5c10e48029ebac9f6b88fb99de5a11f7b0a837d615e94a21d
SHA51290834f66f767ed3eafb8535a16298439ab7ea4013f58eccba89df0cf54800ca73e6cd0c0a9be7a41c4ee23eb458c89e6aad34a499fa1ad9a59db045a09e05435
-
Filesize
386KB
MD515c528f85b1772a8461b0179f1ac0375
SHA10d3198b0e0c38a15812fe8a54af536931bf7122a
SHA25627930d95f28115e5c10e48029ebac9f6b88fb99de5a11f7b0a837d615e94a21d
SHA51290834f66f767ed3eafb8535a16298439ab7ea4013f58eccba89df0cf54800ca73e6cd0c0a9be7a41c4ee23eb458c89e6aad34a499fa1ad9a59db045a09e05435
-
Filesize
386KB
MD5cc7ef4a32d5a91fb76649ccbadb0a58c
SHA158cd81c5809076494df4697e93aa873644ac9231
SHA256c2a1fd2b30902607c55d74e7d1d8891bf3a332f541b432ef5f0b8c5add19d131
SHA5125deb1c35e9c3e0e02c4c6a87724064f8d9be0d34052621512ca3559442d89133b25010c0bc5ae0aec0ae3886aa065e001284f4679044111d7d3187f6dd33d286
-
Filesize
386KB
MD5cc7ef4a32d5a91fb76649ccbadb0a58c
SHA158cd81c5809076494df4697e93aa873644ac9231
SHA256c2a1fd2b30902607c55d74e7d1d8891bf3a332f541b432ef5f0b8c5add19d131
SHA5125deb1c35e9c3e0e02c4c6a87724064f8d9be0d34052621512ca3559442d89133b25010c0bc5ae0aec0ae3886aa065e001284f4679044111d7d3187f6dd33d286
-
Filesize
386KB
MD50ce8c2d82e092f94983dc4e1d3be2a93
SHA1488747b45b236c3a7c92f3515cba5641a49963f3
SHA25686b367c730fcdafbebd0d3937c80a44a32d2fcbf5cf3510b1b9881213040e8db
SHA512c6c7c35663c2212dbc40a6b776a58704dff301e8973750770648cc6c66013c4f11ac8a5bcf824c8244108f743d27946b09d54eeba55c46085640628298e8636f
-
Filesize
386KB
MD50ce8c2d82e092f94983dc4e1d3be2a93
SHA1488747b45b236c3a7c92f3515cba5641a49963f3
SHA25686b367c730fcdafbebd0d3937c80a44a32d2fcbf5cf3510b1b9881213040e8db
SHA512c6c7c35663c2212dbc40a6b776a58704dff301e8973750770648cc6c66013c4f11ac8a5bcf824c8244108f743d27946b09d54eeba55c46085640628298e8636f
-
Filesize
386KB
MD50ce8c2d82e092f94983dc4e1d3be2a93
SHA1488747b45b236c3a7c92f3515cba5641a49963f3
SHA25686b367c730fcdafbebd0d3937c80a44a32d2fcbf5cf3510b1b9881213040e8db
SHA512c6c7c35663c2212dbc40a6b776a58704dff301e8973750770648cc6c66013c4f11ac8a5bcf824c8244108f743d27946b09d54eeba55c46085640628298e8636f
-
Filesize
386KB
MD50ce8c2d82e092f94983dc4e1d3be2a93
SHA1488747b45b236c3a7c92f3515cba5641a49963f3
SHA25686b367c730fcdafbebd0d3937c80a44a32d2fcbf5cf3510b1b9881213040e8db
SHA512c6c7c35663c2212dbc40a6b776a58704dff301e8973750770648cc6c66013c4f11ac8a5bcf824c8244108f743d27946b09d54eeba55c46085640628298e8636f
-
Filesize
386KB
MD50ce8c2d82e092f94983dc4e1d3be2a93
SHA1488747b45b236c3a7c92f3515cba5641a49963f3
SHA25686b367c730fcdafbebd0d3937c80a44a32d2fcbf5cf3510b1b9881213040e8db
SHA512c6c7c35663c2212dbc40a6b776a58704dff301e8973750770648cc6c66013c4f11ac8a5bcf824c8244108f743d27946b09d54eeba55c46085640628298e8636f
-
Filesize
386KB
MD50ce8c2d82e092f94983dc4e1d3be2a93
SHA1488747b45b236c3a7c92f3515cba5641a49963f3
SHA25686b367c730fcdafbebd0d3937c80a44a32d2fcbf5cf3510b1b9881213040e8db
SHA512c6c7c35663c2212dbc40a6b776a58704dff301e8973750770648cc6c66013c4f11ac8a5bcf824c8244108f743d27946b09d54eeba55c46085640628298e8636f
-
Filesize
386KB
MD515c528f85b1772a8461b0179f1ac0375
SHA10d3198b0e0c38a15812fe8a54af536931bf7122a
SHA25627930d95f28115e5c10e48029ebac9f6b88fb99de5a11f7b0a837d615e94a21d
SHA51290834f66f767ed3eafb8535a16298439ab7ea4013f58eccba89df0cf54800ca73e6cd0c0a9be7a41c4ee23eb458c89e6aad34a499fa1ad9a59db045a09e05435
-
Filesize
386KB
MD515c528f85b1772a8461b0179f1ac0375
SHA10d3198b0e0c38a15812fe8a54af536931bf7122a
SHA25627930d95f28115e5c10e48029ebac9f6b88fb99de5a11f7b0a837d615e94a21d
SHA51290834f66f767ed3eafb8535a16298439ab7ea4013f58eccba89df0cf54800ca73e6cd0c0a9be7a41c4ee23eb458c89e6aad34a499fa1ad9a59db045a09e05435