Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.126d6e9073f8444dcf9560f96dba2e60.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.126d6e9073f8444dcf9560f96dba2e60.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.126d6e9073f8444dcf9560f96dba2e60.exe
-
Size
328KB
-
MD5
126d6e9073f8444dcf9560f96dba2e60
-
SHA1
23c4585577ebc0f8265775ae9d634dbadea21141
-
SHA256
70ac00b86b91507d96560d4c4785d64fff0f74085a893844289b11f1d99b3bd7
-
SHA512
b38373954450698979d6f1b42a543815681407ffdf1ae9d1d006117a92e7657aaff23a505e1a4c870f14951827775e03f7a12a6a07bc50589ce63778d5835901
-
SSDEEP
6144:yyWOeLm+tkxoGQvT+W4+HMc+MEGRQ6saHSMf3z0AzbLUG50Tpm+MmvbWdlL0d5aU:yCemx0vN3HKGi6sYjJLUGGtedud5tr7
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\0e3e24de.sys NEAS.126d6e9073f8444dcf9560f96dba2e60.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 2408 takeown.exe 388 icacls.exe 3060 takeown.exe 1256 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\0e3e24de\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\0e3e24de.sys" NEAS.126d6e9073f8444dcf9560f96dba2e60.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 2408 takeown.exe 388 icacls.exe 3060 takeown.exe 1256 icacls.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} NEAS.126d6e9073f8444dcf9560f96dba2e60.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} NEAS.126d6e9073f8444dcf9560f96dba2e60.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects NEAS.126d6e9073f8444dcf9560f96dba2e60.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum NEAS.126d6e9073f8444dcf9560f96dba2e60.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum NEAS.126d6e9073f8444dcf9560f96dba2e60.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum NEAS.126d6e9073f8444dcf9560f96dba2e60.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ws2tcpip.dll NEAS.126d6e9073f8444dcf9560f96dba2e60.exe File opened for modification C:\Windows\SysWOW64\ws2tcpip.dll NEAS.126d6e9073f8444dcf9560f96dba2e60.exe File created C:\Windows\SysWOW64\wshtcpip.dll NEAS.126d6e9073f8444dcf9560f96dba2e60.exe File created C:\Windows\SysWOW64\midimap.dll NEAS.126d6e9073f8444dcf9560f96dba2e60.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID NEAS.126d6e9073f8444dcf9560f96dba2e60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID\name = "NEAS.126d6e9073f8444dcf9560f96dba2e60.exe" NEAS.126d6e9073f8444dcf9560f96dba2e60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL NEAS.126d6e9073f8444dcf9560f96dba2e60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL\name = "7Yuuq.dll" NEAS.126d6e9073f8444dcf9560f96dba2e60.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe Token: SeTakeOwnershipPrivilege 2408 takeown.exe Token: SeTakeOwnershipPrivilege 3060 takeown.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4848 wrote to memory of 2840 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 92 PID 4848 wrote to memory of 2840 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 92 PID 4848 wrote to memory of 2840 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 92 PID 2840 wrote to memory of 2408 2840 cmd.exe 94 PID 2840 wrote to memory of 2408 2840 cmd.exe 94 PID 2840 wrote to memory of 2408 2840 cmd.exe 94 PID 2840 wrote to memory of 388 2840 cmd.exe 95 PID 2840 wrote to memory of 388 2840 cmd.exe 95 PID 2840 wrote to memory of 388 2840 cmd.exe 95 PID 4848 wrote to memory of 412 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 96 PID 4848 wrote to memory of 412 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 96 PID 4848 wrote to memory of 412 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 96 PID 412 wrote to memory of 3060 412 cmd.exe 98 PID 412 wrote to memory of 3060 412 cmd.exe 98 PID 412 wrote to memory of 3060 412 cmd.exe 98 PID 412 wrote to memory of 1256 412 cmd.exe 99 PID 412 wrote to memory of 1256 412 cmd.exe 99 PID 412 wrote to memory of 1256 412 cmd.exe 99 PID 4848 wrote to memory of 2060 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 100 PID 4848 wrote to memory of 2060 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 100 PID 4848 wrote to memory of 2060 4848 NEAS.126d6e9073f8444dcf9560f96dba2e60.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.126d6e9073f8444dcf9560f96dba2e60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.126d6e9073f8444dcf9560f96dba2e60.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\wshtcpip.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:388
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\midimap.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat2⤵PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD510391122ff8e2055b00c4440098ebc88
SHA1e3b41199c25a73c7b980e3a73edb6afe51e273f1
SHA256141d15855fefead79a9718421e2da5b7cb6f5f1d23e9c4e27bb8459fcf76afcb
SHA512061a4d4f4c7b00e498d57177ea8eabb54fbb0d1b3220b2e493a3abeed80d491dfad70e3e5d8dae758d21cc69575ca7b8b5d01b406d647d4bd881138fd790a6d7