Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe
-
Size
1.7MB
-
MD5
86e5bf5f49d8fcf02addad1089af2040
-
SHA1
cceb213a8dd473716244cc093a1d5615d6e279b1
-
SHA256
f444a97206d7d0a931249df0989486856010c2aa3db1d44382925b3afd323da0
-
SHA512
8f9fc9636c956b279fc323fa494f3e91e54e981ff5aeb690dd7a885ebae70866369a70ed6bdf37ebc1e057a9f43caf656be6b97e78eed3b7f78421e3b0090c47
-
SSDEEP
49152:DpPNiqTVoiCVsqSMRrQFTAm4o24TduMpwNRn:NNiqpcsFCrQFEm40vpwj
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe -
Executes dropped EXE 4 IoCs
pid Process 2348 explorer.exe 1048 spoolsv.exe 4736 svchost.exe 2180 spoolsv.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Wine NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Wine explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Wine svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2348 explorer.exe 1048 spoolsv.exe 4736 svchost.exe 2180 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe 2348 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2348 explorer.exe 4736 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 2348 explorer.exe 2348 explorer.exe 1048 spoolsv.exe 1048 spoolsv.exe 4736 svchost.exe 4736 svchost.exe 2180 spoolsv.exe 2180 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 364 wrote to memory of 2348 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 91 PID 364 wrote to memory of 2348 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 91 PID 364 wrote to memory of 2348 364 NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe 91 PID 2348 wrote to memory of 1048 2348 explorer.exe 92 PID 2348 wrote to memory of 1048 2348 explorer.exe 92 PID 2348 wrote to memory of 1048 2348 explorer.exe 92 PID 1048 wrote to memory of 4736 1048 spoolsv.exe 93 PID 1048 wrote to memory of 4736 1048 spoolsv.exe 93 PID 1048 wrote to memory of 4736 1048 spoolsv.exe 93 PID 4736 wrote to memory of 2180 4736 svchost.exe 94 PID 4736 wrote to memory of 2180 4736 svchost.exe 94 PID 4736 wrote to memory of 2180 4736 svchost.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.86e5bf5f49d8fcf02addad1089af2040_JC.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:364 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52bfa209029a602cdc7129c1aec719fdf
SHA11d6b3937b7ff0e2f0ee8df979e6f9cba1c7b4c43
SHA256ffde7c1373066ddd83fe1d075575ef82587c6ecee4b87a12f3966ad25dad1ceb
SHA512acc0e97e8c44f73cfde28ca6a53c8ebcad3c43c428feb7511a8839919e733e77d6ed913673fb5a90eb9319211813524c34aa191af6adc2cb8a455a912b1354d8
-
Filesize
1.7MB
MD58fdc4779bee656ecc2f91d421bd64694
SHA1e4466a672e99118c1e2ef89176469f0be030e648
SHA2563a77ca84848dd0315f24ca4c2e8940dd9f5633229f81c3d3e1b5610279644ab4
SHA512507c596609de896fb76cece047a3d340ee5da0ea1482713f72fd7cd41008776d89d74541ac9137501e79b1d95df28f8e5434ad3394544fd98463108e7d4f49b7
-
Filesize
1.7MB
MD58fdc4779bee656ecc2f91d421bd64694
SHA1e4466a672e99118c1e2ef89176469f0be030e648
SHA2563a77ca84848dd0315f24ca4c2e8940dd9f5633229f81c3d3e1b5610279644ab4
SHA512507c596609de896fb76cece047a3d340ee5da0ea1482713f72fd7cd41008776d89d74541ac9137501e79b1d95df28f8e5434ad3394544fd98463108e7d4f49b7
-
Filesize
1.7MB
MD58fdc4779bee656ecc2f91d421bd64694
SHA1e4466a672e99118c1e2ef89176469f0be030e648
SHA2563a77ca84848dd0315f24ca4c2e8940dd9f5633229f81c3d3e1b5610279644ab4
SHA512507c596609de896fb76cece047a3d340ee5da0ea1482713f72fd7cd41008776d89d74541ac9137501e79b1d95df28f8e5434ad3394544fd98463108e7d4f49b7
-
Filesize
1.7MB
MD51e5bf9801d4cebbba7e56bee9b2716c3
SHA18268a864f22bb1afd594810ecb4de806860ba25d
SHA25635f558252d27827e9e5b8a9be1c88f59197a6495cfa8c8336b03ab8a6d3ccf26
SHA512412d7b2676656f8558398ed44c88f27820bd4ff930f72d1749cd01951e28747a4c43230144f78a7c703446b056c8cfa56feb14e0e7691a9764d51ea4ecc71e3f
-
Filesize
1.7MB
MD58fdc4779bee656ecc2f91d421bd64694
SHA1e4466a672e99118c1e2ef89176469f0be030e648
SHA2563a77ca84848dd0315f24ca4c2e8940dd9f5633229f81c3d3e1b5610279644ab4
SHA512507c596609de896fb76cece047a3d340ee5da0ea1482713f72fd7cd41008776d89d74541ac9137501e79b1d95df28f8e5434ad3394544fd98463108e7d4f49b7
-
Filesize
1.7MB
MD51e5bf9801d4cebbba7e56bee9b2716c3
SHA18268a864f22bb1afd594810ecb4de806860ba25d
SHA25635f558252d27827e9e5b8a9be1c88f59197a6495cfa8c8336b03ab8a6d3ccf26
SHA512412d7b2676656f8558398ed44c88f27820bd4ff930f72d1749cd01951e28747a4c43230144f78a7c703446b056c8cfa56feb14e0e7691a9764d51ea4ecc71e3f
-
Filesize
1.7MB
MD52bfa209029a602cdc7129c1aec719fdf
SHA11d6b3937b7ff0e2f0ee8df979e6f9cba1c7b4c43
SHA256ffde7c1373066ddd83fe1d075575ef82587c6ecee4b87a12f3966ad25dad1ceb
SHA512acc0e97e8c44f73cfde28ca6a53c8ebcad3c43c428feb7511a8839919e733e77d6ed913673fb5a90eb9319211813524c34aa191af6adc2cb8a455a912b1354d8