Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1e334e42a5d03281a176f228c9146260.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.1e334e42a5d03281a176f228c9146260.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.1e334e42a5d03281a176f228c9146260.exe
-
Size
116KB
-
MD5
1e334e42a5d03281a176f228c9146260
-
SHA1
c4b7e7ba42030d9e60fe0049c0817a2cdec9cac3
-
SHA256
481f96f1c2a1715ce21df43b2bbcd25a8643ce7775bfc825d954985d56bbfef9
-
SHA512
04cb91d8a3e61457a4fab5648138f723f886bc1e70a0737c96ea545cb5bbf179e0ca18b3aa7c27428655a51edc6ba3aacf745d4bb41ad9306cf4f530e647e524
-
SSDEEP
1536:HWmzabiro4/j2oR1y5OGQ1oIdKCnS59DYSE3UsYtmSzy50dLT:Z2oTV4CnS59UYtmgh
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\37205 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msraocvf.com" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1800 skypee.exe 2124 skypee.exe 888 skypee.exe -
Loads dropped DLL 3 IoCs
pid Process 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe -
resource yara_rule behavioral1/memory/2992-477-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2992-482-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2992-558-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2992-1142-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2124-1155-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypee = "C:\\Windows\\Skypee\\skypee.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.1e334e42a5d03281a176f228c9146260.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA skypee.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skypee.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skypee.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2376 set thread context of 2992 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 28 PID 1800 set thread context of 2124 1800 skypee.exe 35 PID 1800 set thread context of 888 1800 skypee.exe 36 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msraocvf.com svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Skypee\skypee.exe NEAS.1e334e42a5d03281a176f228c9146260.exe File opened for modification C:\Windows\Skypee\skypee.exe NEAS.1e334e42a5d03281a176f228c9146260.exe File opened for modification C:\Windows\Skypee\skypee.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 888 skypee.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 888 skypee.exe 888 skypee.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe Token: SeDebugPrivilege 2124 skypee.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 1800 skypee.exe 2124 skypee.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2992 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 28 PID 2376 wrote to memory of 2992 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 28 PID 2376 wrote to memory of 2992 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 28 PID 2376 wrote to memory of 2992 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 28 PID 2376 wrote to memory of 2992 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 28 PID 2376 wrote to memory of 2992 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 28 PID 2376 wrote to memory of 2992 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 28 PID 2376 wrote to memory of 2992 2376 NEAS.1e334e42a5d03281a176f228c9146260.exe 28 PID 2992 wrote to memory of 3008 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 31 PID 2992 wrote to memory of 3008 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 31 PID 2992 wrote to memory of 3008 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 31 PID 2992 wrote to memory of 3008 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 31 PID 3008 wrote to memory of 1048 3008 cmd.exe 33 PID 3008 wrote to memory of 1048 3008 cmd.exe 33 PID 3008 wrote to memory of 1048 3008 cmd.exe 33 PID 3008 wrote to memory of 1048 3008 cmd.exe 33 PID 2992 wrote to memory of 1800 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 34 PID 2992 wrote to memory of 1800 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 34 PID 2992 wrote to memory of 1800 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 34 PID 2992 wrote to memory of 1800 2992 NEAS.1e334e42a5d03281a176f228c9146260.exe 34 PID 1800 wrote to memory of 2124 1800 skypee.exe 35 PID 1800 wrote to memory of 2124 1800 skypee.exe 35 PID 1800 wrote to memory of 2124 1800 skypee.exe 35 PID 1800 wrote to memory of 2124 1800 skypee.exe 35 PID 1800 wrote to memory of 2124 1800 skypee.exe 35 PID 1800 wrote to memory of 2124 1800 skypee.exe 35 PID 1800 wrote to memory of 2124 1800 skypee.exe 35 PID 1800 wrote to memory of 2124 1800 skypee.exe 35 PID 1800 wrote to memory of 888 1800 skypee.exe 36 PID 1800 wrote to memory of 888 1800 skypee.exe 36 PID 1800 wrote to memory of 888 1800 skypee.exe 36 PID 1800 wrote to memory of 888 1800 skypee.exe 36 PID 1800 wrote to memory of 888 1800 skypee.exe 36 PID 1800 wrote to memory of 888 1800 skypee.exe 36 PID 1800 wrote to memory of 888 1800 skypee.exe 36 PID 888 wrote to memory of 1604 888 skypee.exe 37 PID 888 wrote to memory of 1604 888 skypee.exe 37 PID 888 wrote to memory of 1604 888 skypee.exe 37 PID 888 wrote to memory of 1604 888 skypee.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1e334e42a5d03281a176f228c9146260.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1e334e42a5d03281a176f228c9146260.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\NEAS.1e334e42a5d03281a176f228c9146260.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1e334e42a5d03281a176f228c9146260.exe"2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\INKKV.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "skypee" /t REG_SZ /d "C:\Windows\Skypee\skypee.exe" /f4⤵
- Adds Run key to start application
PID:1048
-
-
-
C:\Windows\Skypee\skypee.exe"C:\Windows\Skypee\skypee.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\Skypee\skypee.exe"C:\Windows\Skypee\skypee.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
C:\Windows\Skypee\skypee.exe"C:\Windows\Skypee\skypee.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1604
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD56f03830aff31995957052b694b2211a0
SHA1bc98df25a4accd29643b311c106e1cdcecdec93c
SHA2567ddb76d54b187f9e03639ee200536062c36abea7f2fb073ca9bccfb5acc55934
SHA512f02357a8148e3f0c2e3f8f44c317c94450cbda8acd1890369ad91cd1c140089bfbfd6659702f79761e49b8b665f37667d806ccaed416c6de43e1a99d07a69175
-
Filesize
121B
MD56f03830aff31995957052b694b2211a0
SHA1bc98df25a4accd29643b311c106e1cdcecdec93c
SHA2567ddb76d54b187f9e03639ee200536062c36abea7f2fb073ca9bccfb5acc55934
SHA512f02357a8148e3f0c2e3f8f44c317c94450cbda8acd1890369ad91cd1c140089bfbfd6659702f79761e49b8b665f37667d806ccaed416c6de43e1a99d07a69175
-
Filesize
116KB
MD5b5169a00782f19216ff9e90b96cb5d9d
SHA135e65aad47ad1189fb2d093e455d6da360912cf4
SHA25651a81868b87afb46fb3dbf73046f3a774a3f6a9326c3f8db8e5fac59408a7e48
SHA512d392dc0f747b0e0553a91fd9bf6e2a26d924fe48d8e48bca50c76ec571f52288854ed52bac4a1bc85a7751d9446e152aa4e067b69869301afed20fbc5156a3f3
-
Filesize
116KB
MD5b5169a00782f19216ff9e90b96cb5d9d
SHA135e65aad47ad1189fb2d093e455d6da360912cf4
SHA25651a81868b87afb46fb3dbf73046f3a774a3f6a9326c3f8db8e5fac59408a7e48
SHA512d392dc0f747b0e0553a91fd9bf6e2a26d924fe48d8e48bca50c76ec571f52288854ed52bac4a1bc85a7751d9446e152aa4e067b69869301afed20fbc5156a3f3
-
Filesize
116KB
MD5b5169a00782f19216ff9e90b96cb5d9d
SHA135e65aad47ad1189fb2d093e455d6da360912cf4
SHA25651a81868b87afb46fb3dbf73046f3a774a3f6a9326c3f8db8e5fac59408a7e48
SHA512d392dc0f747b0e0553a91fd9bf6e2a26d924fe48d8e48bca50c76ec571f52288854ed52bac4a1bc85a7751d9446e152aa4e067b69869301afed20fbc5156a3f3
-
Filesize
116KB
MD5b5169a00782f19216ff9e90b96cb5d9d
SHA135e65aad47ad1189fb2d093e455d6da360912cf4
SHA25651a81868b87afb46fb3dbf73046f3a774a3f6a9326c3f8db8e5fac59408a7e48
SHA512d392dc0f747b0e0553a91fd9bf6e2a26d924fe48d8e48bca50c76ec571f52288854ed52bac4a1bc85a7751d9446e152aa4e067b69869301afed20fbc5156a3f3
-
Filesize
116KB
MD5b5169a00782f19216ff9e90b96cb5d9d
SHA135e65aad47ad1189fb2d093e455d6da360912cf4
SHA25651a81868b87afb46fb3dbf73046f3a774a3f6a9326c3f8db8e5fac59408a7e48
SHA512d392dc0f747b0e0553a91fd9bf6e2a26d924fe48d8e48bca50c76ec571f52288854ed52bac4a1bc85a7751d9446e152aa4e067b69869301afed20fbc5156a3f3
-
Filesize
116KB
MD5b5169a00782f19216ff9e90b96cb5d9d
SHA135e65aad47ad1189fb2d093e455d6da360912cf4
SHA25651a81868b87afb46fb3dbf73046f3a774a3f6a9326c3f8db8e5fac59408a7e48
SHA512d392dc0f747b0e0553a91fd9bf6e2a26d924fe48d8e48bca50c76ec571f52288854ed52bac4a1bc85a7751d9446e152aa4e067b69869301afed20fbc5156a3f3
-
Filesize
116KB
MD5b5169a00782f19216ff9e90b96cb5d9d
SHA135e65aad47ad1189fb2d093e455d6da360912cf4
SHA25651a81868b87afb46fb3dbf73046f3a774a3f6a9326c3f8db8e5fac59408a7e48
SHA512d392dc0f747b0e0553a91fd9bf6e2a26d924fe48d8e48bca50c76ec571f52288854ed52bac4a1bc85a7751d9446e152aa4e067b69869301afed20fbc5156a3f3
-
Filesize
116KB
MD5b5169a00782f19216ff9e90b96cb5d9d
SHA135e65aad47ad1189fb2d093e455d6da360912cf4
SHA25651a81868b87afb46fb3dbf73046f3a774a3f6a9326c3f8db8e5fac59408a7e48
SHA512d392dc0f747b0e0553a91fd9bf6e2a26d924fe48d8e48bca50c76ec571f52288854ed52bac4a1bc85a7751d9446e152aa4e067b69869301afed20fbc5156a3f3