Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe
-
Size
1.7MB
-
MD5
86e5bf5f49d8fcf02addad1089af2040
-
SHA1
cceb213a8dd473716244cc093a1d5615d6e279b1
-
SHA256
f444a97206d7d0a931249df0989486856010c2aa3db1d44382925b3afd323da0
-
SHA512
8f9fc9636c956b279fc323fa494f3e91e54e981ff5aeb690dd7a885ebae70866369a70ed6bdf37ebc1e057a9f43caf656be6b97e78eed3b7f78421e3b0090c47
-
SSDEEP
49152:DpPNiqTVoiCVsqSMRrQFTAm4o24TduMpwNRn:NNiqpcsFCrQFEm40vpwj
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe -
Executes dropped EXE 4 IoCs
pid Process 1152 explorer.exe 1736 spoolsv.exe 1692 svchost.exe 1668 spoolsv.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Wine NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Wine explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Wine svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 1152 explorer.exe 1736 spoolsv.exe 1692 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 1152 explorer.exe 1736 spoolsv.exe 1692 svchost.exe 1668 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1588 schtasks.exe 1484 schtasks.exe 2764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1736 spoolsv.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1692 svchost.exe 1668 spoolsv.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe 1152 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1152 explorer.exe 1692 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 1152 explorer.exe 1152 explorer.exe 1736 spoolsv.exe 1736 spoolsv.exe 1692 svchost.exe 1692 svchost.exe 1668 spoolsv.exe 1668 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1152 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 28 PID 2880 wrote to memory of 1152 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 28 PID 2880 wrote to memory of 1152 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 28 PID 2880 wrote to memory of 1152 2880 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 28 PID 1152 wrote to memory of 1736 1152 explorer.exe 29 PID 1152 wrote to memory of 1736 1152 explorer.exe 29 PID 1152 wrote to memory of 1736 1152 explorer.exe 29 PID 1152 wrote to memory of 1736 1152 explorer.exe 29 PID 1736 wrote to memory of 1692 1736 spoolsv.exe 30 PID 1736 wrote to memory of 1692 1736 spoolsv.exe 30 PID 1736 wrote to memory of 1692 1736 spoolsv.exe 30 PID 1736 wrote to memory of 1692 1736 spoolsv.exe 30 PID 1692 wrote to memory of 1668 1692 svchost.exe 31 PID 1692 wrote to memory of 1668 1692 svchost.exe 31 PID 1692 wrote to memory of 1668 1692 svchost.exe 31 PID 1692 wrote to memory of 1668 1692 svchost.exe 31 PID 1152 wrote to memory of 1520 1152 explorer.exe 32 PID 1152 wrote to memory of 1520 1152 explorer.exe 32 PID 1152 wrote to memory of 1520 1152 explorer.exe 32 PID 1152 wrote to memory of 1520 1152 explorer.exe 32 PID 1692 wrote to memory of 1588 1692 svchost.exe 33 PID 1692 wrote to memory of 1588 1692 svchost.exe 33 PID 1692 wrote to memory of 1588 1692 svchost.exe 33 PID 1692 wrote to memory of 1588 1692 svchost.exe 33 PID 1692 wrote to memory of 1484 1692 svchost.exe 38 PID 1692 wrote to memory of 1484 1692 svchost.exe 38 PID 1692 wrote to memory of 1484 1692 svchost.exe 38 PID 1692 wrote to memory of 1484 1692 svchost.exe 38 PID 1692 wrote to memory of 2764 1692 svchost.exe 40 PID 1692 wrote to memory of 2764 1692 svchost.exe 40 PID 1692 wrote to memory of 2764 1692 svchost.exe 40 PID 1692 wrote to memory of 2764 1692 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 11:39 /f5⤵
- Creates scheduled task(s)
PID:1588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 11:40 /f5⤵
- Creates scheduled task(s)
PID:1484
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 11:41 /f5⤵
- Creates scheduled task(s)
PID:2764
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:1520
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD569218c963b12667dc582a5b1fe6d27f7
SHA196f196184e48a0f840a12d15db127d7170f6fd43
SHA25646ba14ff395a068479ef606e91a253e7aa866d82f7dc600c9ed9234b4f4db3e0
SHA512cfc6466b90c6b45fe88ca685fe070b5954a7d148fcaabf2aec2827ec98b861c18ef3aa8bcff07dde8290ed4139c05d9d2239ea397eb38e89e0483d25fa773908
-
Filesize
1.7MB
MD5394ae7174f1ec09708c26b36c5cf8246
SHA1a6b061cf5a96f695b7bbe035257966569b764cbc
SHA256c3a12e452a76098c4df13490a128ceeb63d36bc684a7d77cd157e15ab4c5001e
SHA51253b7c3153a7c7ba49eb7da709af1a03bcace644d487a14772f4295a819c5ec4074361b371ebd137e02858597071d9308dd3a1b2f598d8a389446def3eae0b6ae
-
Filesize
1.7MB
MD5394ae7174f1ec09708c26b36c5cf8246
SHA1a6b061cf5a96f695b7bbe035257966569b764cbc
SHA256c3a12e452a76098c4df13490a128ceeb63d36bc684a7d77cd157e15ab4c5001e
SHA51253b7c3153a7c7ba49eb7da709af1a03bcace644d487a14772f4295a819c5ec4074361b371ebd137e02858597071d9308dd3a1b2f598d8a389446def3eae0b6ae
-
Filesize
1.7MB
MD5394ae7174f1ec09708c26b36c5cf8246
SHA1a6b061cf5a96f695b7bbe035257966569b764cbc
SHA256c3a12e452a76098c4df13490a128ceeb63d36bc684a7d77cd157e15ab4c5001e
SHA51253b7c3153a7c7ba49eb7da709af1a03bcace644d487a14772f4295a819c5ec4074361b371ebd137e02858597071d9308dd3a1b2f598d8a389446def3eae0b6ae
-
Filesize
1.7MB
MD58e0a33dba3d636f9af101eb1542af43f
SHA111842fff75fe8042f3a7f0a43fdbff555fe6f203
SHA25644e77e0bb2a5335e04da1cf63554504d94639a7c9193521e15f07d60902af181
SHA512decee8364279c339c8b5b322c013c0ce014546f7d444502257b16151aa257f6d9ca227e332ab1aee465fe65cc403478937c0fad078a315c4985809368890fe4b
-
Filesize
1.7MB
MD5394ae7174f1ec09708c26b36c5cf8246
SHA1a6b061cf5a96f695b7bbe035257966569b764cbc
SHA256c3a12e452a76098c4df13490a128ceeb63d36bc684a7d77cd157e15ab4c5001e
SHA51253b7c3153a7c7ba49eb7da709af1a03bcace644d487a14772f4295a819c5ec4074361b371ebd137e02858597071d9308dd3a1b2f598d8a389446def3eae0b6ae
-
Filesize
1.7MB
MD58e0a33dba3d636f9af101eb1542af43f
SHA111842fff75fe8042f3a7f0a43fdbff555fe6f203
SHA25644e77e0bb2a5335e04da1cf63554504d94639a7c9193521e15f07d60902af181
SHA512decee8364279c339c8b5b322c013c0ce014546f7d444502257b16151aa257f6d9ca227e332ab1aee465fe65cc403478937c0fad078a315c4985809368890fe4b
-
Filesize
1.7MB
MD569218c963b12667dc582a5b1fe6d27f7
SHA196f196184e48a0f840a12d15db127d7170f6fd43
SHA25646ba14ff395a068479ef606e91a253e7aa866d82f7dc600c9ed9234b4f4db3e0
SHA512cfc6466b90c6b45fe88ca685fe070b5954a7d148fcaabf2aec2827ec98b861c18ef3aa8bcff07dde8290ed4139c05d9d2239ea397eb38e89e0483d25fa773908
-
Filesize
1.7MB
MD569218c963b12667dc582a5b1fe6d27f7
SHA196f196184e48a0f840a12d15db127d7170f6fd43
SHA25646ba14ff395a068479ef606e91a253e7aa866d82f7dc600c9ed9234b4f4db3e0
SHA512cfc6466b90c6b45fe88ca685fe070b5954a7d148fcaabf2aec2827ec98b861c18ef3aa8bcff07dde8290ed4139c05d9d2239ea397eb38e89e0483d25fa773908
-
Filesize
1.7MB
MD5394ae7174f1ec09708c26b36c5cf8246
SHA1a6b061cf5a96f695b7bbe035257966569b764cbc
SHA256c3a12e452a76098c4df13490a128ceeb63d36bc684a7d77cd157e15ab4c5001e
SHA51253b7c3153a7c7ba49eb7da709af1a03bcace644d487a14772f4295a819c5ec4074361b371ebd137e02858597071d9308dd3a1b2f598d8a389446def3eae0b6ae
-
Filesize
1.7MB
MD5394ae7174f1ec09708c26b36c5cf8246
SHA1a6b061cf5a96f695b7bbe035257966569b764cbc
SHA256c3a12e452a76098c4df13490a128ceeb63d36bc684a7d77cd157e15ab4c5001e
SHA51253b7c3153a7c7ba49eb7da709af1a03bcace644d487a14772f4295a819c5ec4074361b371ebd137e02858597071d9308dd3a1b2f598d8a389446def3eae0b6ae
-
Filesize
1.7MB
MD58e0a33dba3d636f9af101eb1542af43f
SHA111842fff75fe8042f3a7f0a43fdbff555fe6f203
SHA25644e77e0bb2a5335e04da1cf63554504d94639a7c9193521e15f07d60902af181
SHA512decee8364279c339c8b5b322c013c0ce014546f7d444502257b16151aa257f6d9ca227e332ab1aee465fe65cc403478937c0fad078a315c4985809368890fe4b