Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe
-
Size
267KB
-
MD5
719c0791f626c70d0c5cb4c43e83fa90
-
SHA1
75c1cda99dc949acb9d69d31884785f81a85da7c
-
SHA256
61cbb11ab0135c985a2ff2cbb30af971ed3df84fecd01f24c1930a7cfdd48780
-
SHA512
3651acee5ba4a34bb02c5033d0ec80b3d38540601e7ccfa3db2c649a4ed7078b5c6a095f9cbc1c42aba2a38c8cf5c35db156140fe85b6102f89972d34096520e
-
SSDEEP
3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2Qu:WcNhJgX9z9TB0YRX8n6u
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fakerdtsc\ImagePath = 5c003f003f005c0043003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c00540065006d0070005c00660061006b006500720064007400730063002e007300790073000000 NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE -
Executes dropped EXE 4 IoCs
pid Process 2292 MSWDM.EXE 2152 MSWDM.EXE 1308 NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE 2824 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2152 MSWDM.EXE 2152 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe File opened for modification C:\Windows\dev6E0F.tmp NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe File opened for modification C:\Windows\dev6E0F.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2152 MSWDM.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1308 NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1308 NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2292 2204 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 28 PID 2204 wrote to memory of 2292 2204 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 28 PID 2204 wrote to memory of 2292 2204 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 28 PID 2204 wrote to memory of 2292 2204 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 28 PID 2204 wrote to memory of 2152 2204 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 29 PID 2204 wrote to memory of 2152 2204 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 29 PID 2204 wrote to memory of 2152 2204 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 29 PID 2204 wrote to memory of 2152 2204 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 29 PID 2152 wrote to memory of 1308 2152 MSWDM.EXE 30 PID 2152 wrote to memory of 1308 2152 MSWDM.EXE 30 PID 2152 wrote to memory of 1308 2152 MSWDM.EXE 30 PID 2152 wrote to memory of 1308 2152 MSWDM.EXE 30 PID 2152 wrote to memory of 2824 2152 MSWDM.EXE 31 PID 2152 wrote to memory of 2824 2152 MSWDM.EXE 31 PID 2152 wrote to memory of 2824 2152 MSWDM.EXE 31 PID 2152 wrote to memory of 2824 2152 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2292
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev6E0F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev6E0F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD53f7a20ad566db6aaa078a2d79170ce9e
SHA1ea2c9c82f1a5271a01bc417bc1d5254a77bf47d9
SHA256adbf970306783f99e10cb391257dc5ee615c749c48be2b376a980c93db01433d
SHA512e10001d5705968a6b44f4f615d9ed59955fa375ba8d156843c3961f9deb28d83d42951c40b5cc39af497bcb31ed372f468b21a769c5cd3cecd428f22094e915c
-
Filesize
267KB
MD53f7a20ad566db6aaa078a2d79170ce9e
SHA1ea2c9c82f1a5271a01bc417bc1d5254a77bf47d9
SHA256adbf970306783f99e10cb391257dc5ee615c749c48be2b376a980c93db01433d
SHA512e10001d5705968a6b44f4f615d9ed59955fa375ba8d156843c3961f9deb28d83d42951c40b5cc39af497bcb31ed372f468b21a769c5cd3cecd428f22094e915c
-
Filesize
11KB
MD59feff3c663336f7a555698bc2bc26f15
SHA12ae180fb131802e91922a153e3c497b807b4cd08
SHA2568c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c
SHA51239c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf
-
Filesize
11KB
MD59feff3c663336f7a555698bc2bc26f15
SHA12ae180fb131802e91922a153e3c497b807b4cd08
SHA2568c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c
SHA51239c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
11KB
MD59feff3c663336f7a555698bc2bc26f15
SHA12ae180fb131802e91922a153e3c497b807b4cd08
SHA2568c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c
SHA51239c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf
-
Filesize
11KB
MD59feff3c663336f7a555698bc2bc26f15
SHA12ae180fb131802e91922a153e3c497b807b4cd08
SHA2568c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c
SHA51239c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf
-
Filesize
11KB
MD59feff3c663336f7a555698bc2bc26f15
SHA12ae180fb131802e91922a153e3c497b807b4cd08
SHA2568c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c
SHA51239c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf