Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.20e3aa334802f806ed78c72f08d9d700.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.20e3aa334802f806ed78c72f08d9d700.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.20e3aa334802f806ed78c72f08d9d700.exe
-
Size
12KB
-
MD5
20e3aa334802f806ed78c72f08d9d700
-
SHA1
73256fdee8aca5ec85db0355dca6db869d63221e
-
SHA256
bcfb9abe343c0c3a93c86fd9923c79c95d97776f4733feba409c030908870071
-
SHA512
43235216e28828e919b3d0d4dcf6251171bddb5aff7c22fa2d4f5ab3a6bf33b3cc8c97d9c9af4bdd57af23c1f5e7de569b5c05aff59b2fb0d2716d71658521cc
-
SSDEEP
384:KL7li/2zDq2DcEQvdhcJKLTp/NK9xaPn:UHM/Q9cPn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2680 tmp7F10.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 tmp7F10.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2876 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe 28 PID 2872 wrote to memory of 2876 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe 28 PID 2872 wrote to memory of 2876 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe 28 PID 2872 wrote to memory of 2876 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe 28 PID 2876 wrote to memory of 2776 2876 vbc.exe 30 PID 2876 wrote to memory of 2776 2876 vbc.exe 30 PID 2876 wrote to memory of 2776 2876 vbc.exe 30 PID 2876 wrote to memory of 2776 2876 vbc.exe 30 PID 2872 wrote to memory of 2680 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe 31 PID 2872 wrote to memory of 2680 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe 31 PID 2872 wrote to memory of 2680 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe 31 PID 2872 wrote to memory of 2680 2872 NEAS.20e3aa334802f806ed78c72f08d9d700.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.20e3aa334802f806ed78c72f08d9d700.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.20e3aa334802f806ed78c72f08d9d700.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lcc5whxl\lcc5whxl.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES87C6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6CF574B9927B4930A8D07598B286919.TMP"3⤵PID:2776
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7F10.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7F10.tmp.exe" C:\Users\Admin\AppData\Local\Temp\NEAS.20e3aa334802f806ed78c72f08d9d700.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD516ff3ef6ff9020e570f42b94ef6ef59c
SHA178e1667064c3ed8a785af24fd196f982b152d19a
SHA2566cf02b097ed3365b52fcb21506872030f97f6091741a4b0aa639e6168c31c1b0
SHA512d519f85d8b82dbedac27607777226a528de1a14de7f624eeddf95ae22424a5021a33fd3ca02f1edfcf53f4f7783f52e1a5e394bc855240b1da96fd8dafda817b
-
Filesize
1KB
MD5dc74e393cc08b4118dd2893910737bb0
SHA173c5e023b2a8e45685ff9ee30c470fcaac55a660
SHA256829c7925da775e4dac5c1c12680b4d8d68fb0b13b001c7f311b3a9d66f6365f7
SHA51251c2e6fdde85fc1e275deac065dbe49d88696af738ded4a68df552b3386f17f3056e6ef65aa1c92621cbf3e5c5f626dcf0d37acdde951f458bedd297c382b037
-
Filesize
2KB
MD518c89170270aacd60db1f787b316f45a
SHA15b98b6ce3cf6767285fc54c6dde61f1170946e5f
SHA25671552cf5f196e9162833e78a6ef53ce86e947143acfc972090644e240846f88c
SHA512cdc4a923d39e6cd24d831d22723ced222615dee308e2593497a8a1ccba1f4fa44660dcf09a3e112d589a38362e9f2b63c1408333e54df5c3d4f522994f72895a
-
Filesize
273B
MD529a9800089e2fa979c75ba8c2a3376a6
SHA10e83fd0aaa1dfd429b7f2e4a0b4db00474265f76
SHA25668b7abffaafe74cd297c9e5b2dda903b47185f6dc8c68dcd33383d43a97eea76
SHA51286ff599833b3efcaf55721b812349eb93b51f047cdfa33bc39a3d19395169124c8b71bd22f113e7c00b56308da07ae92d4e149e738e08f81b79a4e34eb05b4ae
-
Filesize
12KB
MD5ff177f3e1b3c92a003e81aa4967c22a2
SHA12dbb144079175fdee86f04ee79640d695a2e8c9b
SHA256d3597175cc375fc575f9cf4d2cb84dacc6172c59f7daa05f6e43bc33bde1b197
SHA512f3410aa0bdb820b8b9bdf39ff16d0a7b2d459b7015d6aa2d9b26b5d98d9a0b6dc6e892abbfa7a6662b2962800469490f5f9c854b792806fd7ee955b5f1730fa9
-
Filesize
12KB
MD5ff177f3e1b3c92a003e81aa4967c22a2
SHA12dbb144079175fdee86f04ee79640d695a2e8c9b
SHA256d3597175cc375fc575f9cf4d2cb84dacc6172c59f7daa05f6e43bc33bde1b197
SHA512f3410aa0bdb820b8b9bdf39ff16d0a7b2d459b7015d6aa2d9b26b5d98d9a0b6dc6e892abbfa7a6662b2962800469490f5f9c854b792806fd7ee955b5f1730fa9
-
Filesize
1KB
MD59f326af698cf394d22e71394229756b9
SHA1691a445d4099c0fab10e52c160aa8a10d20c22b2
SHA256ef35e29449d1f30249fd420d4360155c9ac1deed82d9a7a011ea1e0efa101b2f
SHA5121a62febd9a10d035150e49a00b5495fd29dfdc3778fa2adceb4e55be1b0806524ff4367b612caef39365473d0bc8c5408ef970ae448921ec51fa5697d483588a
-
Filesize
12KB
MD5ff177f3e1b3c92a003e81aa4967c22a2
SHA12dbb144079175fdee86f04ee79640d695a2e8c9b
SHA256d3597175cc375fc575f9cf4d2cb84dacc6172c59f7daa05f6e43bc33bde1b197
SHA512f3410aa0bdb820b8b9bdf39ff16d0a7b2d459b7015d6aa2d9b26b5d98d9a0b6dc6e892abbfa7a6662b2962800469490f5f9c854b792806fd7ee955b5f1730fa9