Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 08:51

General

  • Target

    NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe

  • Size

    393KB

  • MD5

    ea8cbde2a13a3fdcb31ade83e7498510

  • SHA1

    7130588684c87d29cbd9bf25cd8823f69dda5e2e

  • SHA256

    e75de707168383230955693f4d7079f1099cf520d27bcba20d3226c9554e18ef

  • SHA512

    5e89460e76edf59a55e11815692917fc5caf32e4adae92bbd5cedf3666e9a14f1ae8f651860adefda2b0f14084897588b2b25c80c75334ec9858ecb612bee194

  • SSDEEP

    6144:gs833CnotE7RN8JmrwW9NaZIGBQLBYUSWO7F3vZeSRlaYy/hO3s:mLtE7RaflQL6UfMMd/hes

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://img.sedoparking.com/images/js_preloader.gif?cod=00568D635A000918F1C7F&user=err&shared=0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a9943f6886ce6fc507a1828800a7956

    SHA1

    92cf242d4363d54176a5b769d3d5f5abb53760c0

    SHA256

    4d0540f1ff2a1a2b3f819d3c16b9534a66c3940237cb50aae4acd34f721baff9

    SHA512

    7831b8b8b823093ab9062145d48e4651000729178c34d71b0cf919588add59c9e6575aef5bead935305f5391d085c24d65cc0db619b8772b05e6646b07184f4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4602ff8ae8c43219498ed48c908cd28

    SHA1

    d02cc3582d3c9c559cc55f8434175b5a8f9511a5

    SHA256

    024067f5e2607a1f2e172d5ffe045a150491bc89cfe4ee9436cd76d5bed11d81

    SHA512

    52588d7f37af89e6122737a173433090b01183f53dacf4e2eca33f0f38303fe6d180e71c64f63e0428c404083044d5c0fbc6faf197fa80b78637eeddeedbc82d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    296ccbe2082f4336641bb1e32f766855

    SHA1

    ee7eb8c1ad80138bb65add691a38ece9c8131e7b

    SHA256

    599a03d17ca796d5b8f235c775d8478cae5da1601bb44b100e4ab0752564a36c

    SHA512

    92b15c71317f45c6d4b4b5c45f674c7f0a98349c84797e17b416d7dfba18b67b89960a4e9a9bea42e301a92543938055c301d72a285803c4fab261dc95da6b37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f423bf8877e725acd58e714bea44f279

    SHA1

    69645ed0e9a63cdf6257c009370a980895b819f6

    SHA256

    3b8ebf8155619c0b937428a540b352e1612d8f63813608e70d30e0259e0844bb

    SHA512

    fbb616bb6edf6a03715ba6a84dccb916633bcb46e77994eb1adf230fb701ead8809791875b01743511a4c2274f4a16629224ed1321e337b7758087c2067f9cf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71b60cff4e549138bdbe5ba08c468f12

    SHA1

    859cf8eeab452951f240d76dbdc9a51a2e7cfb02

    SHA256

    9fc4a01aa1abff21fff72aa64f652cccdcbb537825a1480dcf7e234fab1f33a1

    SHA512

    d07f527039bd56bf05d2dc71d4254caf4cbf32d4f9fa966f5213e0255fff342f196b09a06137cf536108e2bc949f86d1f172e3276791f5df319109ee4c262e0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca50c15dc93bfac3568c1f7abff71174

    SHA1

    2091e48b18377f48bca0504c05f97198cf8fa0fb

    SHA256

    3a72370b629549ce389fff80f45164430aef58711c7f3bdbd631bf6333712100

    SHA512

    3cc5633de7137b726ebe6f93d979a959469dbfdba440f20eb1a5e908b619983ffe3aa71fdc93f09901ef8fdc5b1f95ecac4ad136f638c7313a41b5af91af311c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    757a1f0d95964e93f2742ec80fd8a059

    SHA1

    d0e0f2c462fcf04b9ad7c56c8cfbfed463057ecd

    SHA256

    c2a39ed4e900fe20fae0feac2e48df45ddb239ba8c87cd11c54f62021102a8e1

    SHA512

    967c47b186391d2089342e470b8e7acf936d3ae052cc6d523500f3e5426e340dc02e6923172031e596e2aacd5a5505c4126fa0f5b2040c22e2dbb15a59a4fe04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e7fab10dcec963b47b8cffc8664f9ef6

    SHA1

    d7e07fff1d5c97c70363828e6326270a9aef3ad0

    SHA256

    449c7dc19d03c9c3aa8a4c70a7ff9340108451ae28737c12593910fcd795b79a

    SHA512

    7c49e705c33fbc1e6c4e0e473a929674a97450025ad4209122f34abf7213182a32f4545a67e99b6ec30f984632dc15a5fa38f44c7bae370e397da66c80123ea3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c477373f8683d1f47b8d220a8b4fe718

    SHA1

    4d4009fa94371057d06593605d10650ef3981073

    SHA256

    98112b680caebd72afac2195c8a20f3bb8721104309cffc97fd1164f279f76ef

    SHA512

    9a4ba2ad85f54c4a95a13e71bdf1004978977a451ae6330139e748466abc402caa7606458f372ccaa471551cf83e0860afe94b64b195711a5ead7332f1d33cfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99588fbfe966003899cbef7a468fba47

    SHA1

    26209fac29a46ad67b0046c3138570b7fe4d0d64

    SHA256

    b4ba0e72e15519e397a27cb9f4e8940ae2ba9dabba980e672aaf7d224e0065c2

    SHA512

    d13346187a4be983f5199c07d03485d753d31ccd605fc56a75017870afc43358505927f1c808b580c881cc2dbd6e57f31ae326ad26abd6264dead939a52e15d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de7d1533b6179782a17adfc3dffd5e39

    SHA1

    1d65e0a5d33e8849bfb8bced36b9fd6efbba319f

    SHA256

    245a7c58c90c8c402cec7309e259e1489007c97cf388eda17f58faa68751f876

    SHA512

    5ded27d284fee7dba676bac96113c726f7b627149cc0bd9883f8b82cfd3d78792f0dda46516d109c86c0760b2ddda48cb034c32f6ec97eaf9eda3e06dd7b2256

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa2ca3f8c2d0df031d7d924c06cb2ff8

    SHA1

    b0941db629a9f175ee8238cca8d1804e44de6e7c

    SHA256

    aaf96878975296b25d3707cc4a400d7ff35c35bd2b5566403e7e10ff1030ac3a

    SHA512

    6b161ac139ce135fa22e2408adef7474c7656e353dedd7e4c88c218a360c96fce7cafb9039d90191cf42dfba6b35694c4c8edd9d91b8e82ff02bc970d79981a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a27e592dd980c9a4094545cca09e91db

    SHA1

    a0daf0da5596587a65c35c2ca7648c92ce72cb5e

    SHA256

    d2a05575834557aa30e1d4b3fa54277ea4646951252ee3bd1ebd125d703fa735

    SHA512

    87f375852b90f8e7188db705252c291ad80b347a5699ff2bc3a6945e04e32d3b834fea032c7e251eb78d44476c01bf61b9261a157fd28ac0c6b443c5416936ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8faf54df39e8f6bafa79a81a57523425

    SHA1

    6ce62093b72759766b174afb72a780bbd833b036

    SHA256

    6ba2f03f75d51875c28b0273badf862835644731cf46038f0f0f0a5d4e8a94d5

    SHA512

    95fda25427dc0c6968a484860d2c22e11d5cd69223cfb22274a9d502ee1ede0591e096e2512a41c72bccffdd5221782a52f3d276bf94d1e963d152d6beca671d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50f725f1609ff76f275b46a261f26f7d

    SHA1

    c34a403ce414e9073bd7a82c9ad871451b8c2d6e

    SHA256

    9d0c013ba83cfe39e953548a3e1dc552eab6290cbf7af9f542e144473f7ab0dc

    SHA512

    1ef8951f0c16be531edea2c0957aa5ad6392641015c160bdcd9f0b23a4b12cda5457442c13d34516d4bdac3f2fbcc9501e89f6862fcadae77c0f8de412aa036d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29ba6e6c79d26e384a67b8c07f832e86

    SHA1

    fcc6b038f2d80c919126627e4e20e8ca22ee0649

    SHA256

    94a106ee0aeafb0aeca6822a27d3335e61aa04e85d67ab5831aba4ecf926113e

    SHA512

    3e273e27eee1fb16694e4165bc8093e696a32c27468d672fa8c8323bf6b905756ec2080f79a61d673b439c0658ada52f22c3316a9935db0fea6cc85eac757b73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0d516245413c3038963bbe4e35ecf21

    SHA1

    19fedab7e3cefca0efb79e565bc6e6e515ea491b

    SHA256

    1b2c4bae76543e8b9d47e9ecd92eef5b3cbbc22c4dba2bbcd805e5210a2a59ea

    SHA512

    7a90b9b78cd4937bd17c06b50165acbff556fe61ce3b86a11ed1b0167faa5ae4e9bc9025d945014ea4193448a40d08843a8c7a05b7b39745bda8ac085e2f74b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b713223beb8fe614b9cac5fa6c168ad

    SHA1

    0cc3b650ead454270550fefed06df1da9ad11de5

    SHA256

    50eee5f92aed173e816d8bb5fcf0bab8750f74277bb74b5a29b07c16c33da261

    SHA512

    b208d6e2f18d7876a231bed04f979612192e91fb810f6f7c192fac023db32e487f0836189a472f8ecbff31f838b6d37fbf73307e819d0970ad86f4b40e9d4139

  • C:\Users\Admin\AppData\Local\Temp\CabAC47.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarAC8B.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Windows\Temp\sys32\$$FREE$$ .exe

    Filesize

    423KB

    MD5

    db51aad64de497bf7b37da91663505e2

    SHA1

    9e7084ab336fbe45d5fa8f2191b3358cdc17baa3

    SHA256

    5e67afb9e817be178df065831071168974f047424431b52911f9fb8efb629941

    SHA512

    b947cddf39acdb6cd8a0e4d4a3aeb4fa4681618791eeca86c1825e5359e47c2a28943da6bce181b4a15168a2c477d0eae1d7515e5c7cf5d01c1911f785c6348c

  • memory/2800-8-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-515-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-553-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-10-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2800-477-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-534-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2800-458-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-496-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-1004-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-1025-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-1044-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-1063-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-1080-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-1101-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2800-1120-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB