Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
183s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.85c8cb3474136de6fe347a0d35b13b10.exe
Resource
win7-20231023-en
General
-
Target
NEAS.85c8cb3474136de6fe347a0d35b13b10.exe
-
Size
317KB
-
MD5
85c8cb3474136de6fe347a0d35b13b10
-
SHA1
31edf8656d3c02a4861f972c46f40a84265d64ea
-
SHA256
f3c2f6d2121f2f679a62e8fd10bb26241a8848e01808377dc486d419ab0ac3d3
-
SHA512
9170482f7486e5cb8eacc112041bb42b7bcb8cc507b28bd7635b3df378ab189bd15ec85b9d469a5e676f5e428555fb4b2a7f704129f73062db3ea7e254fb7e7f
-
SSDEEP
6144:6z12ck8nxgTt5BqUngBSAaonW387ZDIrDDMxJAU2cAC71f9F5HVF1yyTh:6z12ckYxWn0SCWs7ZUrDYxCTcACV3lwS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2688 1890.tmp -
Loads dropped DLL 2 IoCs
pid Process 768 NEAS.85c8cb3474136de6fe347a0d35b13b10.exe 768 NEAS.85c8cb3474136de6fe347a0d35b13b10.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE 1890.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACECORE.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\msdia90.dll 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EntityPicker.dll 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\weblink.api 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\MSCONV97.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msolui100.dll 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnvpxy.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\JPEGIM32.FLT 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\MSLID.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdate.dll 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMSMDB32.DLL 1890.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AXSLE.dll 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe 1890.tmp File opened for modification C:\Program Files\7-Zip\7zCon.sfx 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeXMP.dll 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX8.x3d 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACERCLR.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\WebKit.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\hxds.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\FPSRVUTL.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUTHZAX.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Spelling.api 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\ADMPlugin.apl 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\DBGHELP.DLL 1890.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\msdia100.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\MSADDNDR.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\MSB1FREN.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXP_PDF.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\OSetupPS.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll 1890.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ENVELOPE.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PPKLite.api 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACETXT.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKPowerPoint.dll 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Updater.api 1890.tmp File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroPDF.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\GIFIMP32.FLT 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\PNG32.FLT 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\USP10.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\IETAG.DLL 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSStr32.dll 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIB.dll 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\ReadOutLoud.api 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\EPSIMP32.FLT 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\msitss55.dll 1890.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\authplay.dll 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\rt3d.dll 1890.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\JP2KLib.dll 1890.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msmdlocal.dll 1890.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ContactPicker.dll 1890.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ACE.dll 1890.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 768 wrote to memory of 2688 768 NEAS.85c8cb3474136de6fe347a0d35b13b10.exe 29 PID 768 wrote to memory of 2688 768 NEAS.85c8cb3474136de6fe347a0d35b13b10.exe 29 PID 768 wrote to memory of 2688 768 NEAS.85c8cb3474136de6fe347a0d35b13b10.exe 29 PID 768 wrote to memory of 2688 768 NEAS.85c8cb3474136de6fe347a0d35b13b10.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.85c8cb3474136de6fe347a0d35b13b10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.85c8cb3474136de6fe347a0d35b13b10.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\1890.tmpC:\Users\Admin\AppData\Local\Temp\1890.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2688
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666