Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.73940ba7afd0db3e157c6e6032892d50_JC.dll
Resource
win7-20231023-en
General
-
Target
NEAS.73940ba7afd0db3e157c6e6032892d50_JC.dll
-
Size
120KB
-
MD5
73940ba7afd0db3e157c6e6032892d50
-
SHA1
f70ca1fa3052a1a209c0ee0aa87071051f73927b
-
SHA256
34556331a1ebdf60b9e3153917ea5c96a974ea1565b1ed1005a0f7f8afde290d
-
SHA512
0c209ae639b80638f13b310b9ea68b479bf53c3fb58edc484d1f5b013fe88cfad1bba3e5c0776c5b3fe6d4979310056598154ee271a76bc71b3a3be0ce1c7a53
-
SSDEEP
1536:b2wm9/g8D6NXiFxQE7M4bzwIW7lawWU3GyksAaoVrgdSSmlOUg7:b2wme8D6N7Ew4fwTlnKynAaE88SmHg
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7639b6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7639b6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7639b6.exe -
Executes dropped EXE 3 IoCs
pid Process 3020 f7639b6.exe 2680 f7647ca.exe 2968 f765226.exe -
Loads dropped DLL 6 IoCs
pid Process 2444 rundll32.exe 2444 rundll32.exe 2444 rundll32.exe 2444 rundll32.exe 2444 rundll32.exe 2444 rundll32.exe -
resource yara_rule behavioral1/memory/3020-11-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-15-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-16-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-17-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-19-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-22-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-26-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-34-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-50-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-55-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-37-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-57-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-63-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-78-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-79-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-81-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-82-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-83-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-86-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-94-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-100-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/3020-134-0x0000000000690000-0x000000000174A000-memory.dmp upx behavioral1/memory/2968-140-0x0000000000910000-0x00000000019CA000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7639b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7639b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7639b6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7639b6.exe -
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: f7639b6.exe File opened (read-only) \??\G: f7639b6.exe File opened (read-only) \??\H: f7639b6.exe File opened (read-only) \??\I: f7639b6.exe File opened (read-only) \??\J: f7639b6.exe File opened (read-only) \??\K: f7639b6.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI f7639b6.exe File created C:\Windows\f763abf f7639b6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3020 f7639b6.exe 3020 f7639b6.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe Token: SeDebugPrivilege 3020 f7639b6.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2444 2584 rundll32.exe 28 PID 2584 wrote to memory of 2444 2584 rundll32.exe 28 PID 2584 wrote to memory of 2444 2584 rundll32.exe 28 PID 2584 wrote to memory of 2444 2584 rundll32.exe 28 PID 2584 wrote to memory of 2444 2584 rundll32.exe 28 PID 2584 wrote to memory of 2444 2584 rundll32.exe 28 PID 2584 wrote to memory of 2444 2584 rundll32.exe 28 PID 2444 wrote to memory of 3020 2444 rundll32.exe 29 PID 2444 wrote to memory of 3020 2444 rundll32.exe 29 PID 2444 wrote to memory of 3020 2444 rundll32.exe 29 PID 2444 wrote to memory of 3020 2444 rundll32.exe 29 PID 3020 wrote to memory of 1116 3020 f7639b6.exe 12 PID 3020 wrote to memory of 1220 3020 f7639b6.exe 13 PID 3020 wrote to memory of 1260 3020 f7639b6.exe 15 PID 3020 wrote to memory of 456 3020 f7639b6.exe 18 PID 3020 wrote to memory of 2584 3020 f7639b6.exe 27 PID 3020 wrote to memory of 2444 3020 f7639b6.exe 28 PID 3020 wrote to memory of 2444 3020 f7639b6.exe 28 PID 2444 wrote to memory of 2680 2444 rundll32.exe 30 PID 2444 wrote to memory of 2680 2444 rundll32.exe 30 PID 2444 wrote to memory of 2680 2444 rundll32.exe 30 PID 2444 wrote to memory of 2680 2444 rundll32.exe 30 PID 2444 wrote to memory of 2968 2444 rundll32.exe 31 PID 2444 wrote to memory of 2968 2444 rundll32.exe 31 PID 2444 wrote to memory of 2968 2444 rundll32.exe 31 PID 2444 wrote to memory of 2968 2444 rundll32.exe 31 PID 3020 wrote to memory of 1116 3020 f7639b6.exe 12 PID 3020 wrote to memory of 1220 3020 f7639b6.exe 13 PID 3020 wrote to memory of 1260 3020 f7639b6.exe 15 PID 3020 wrote to memory of 2680 3020 f7639b6.exe 30 PID 3020 wrote to memory of 2680 3020 f7639b6.exe 30 PID 3020 wrote to memory of 2968 3020 f7639b6.exe 31 PID 3020 wrote to memory of 2968 3020 f7639b6.exe 31 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7639b6.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1220
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.73940ba7afd0db3e157c6e6032892d50_JC.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.73940ba7afd0db3e157c6e6032892d50_JC.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\f7639b6.exeC:\Users\Admin\AppData\Local\Temp\f7639b6.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\f7647ca.exeC:\Users\Admin\AppData\Local\Temp\f7647ca.exe4⤵
- Executes dropped EXE
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\f765226.exeC:\Users\Admin\AppData\Local\Temp\f765226.exe4⤵
- Executes dropped EXE
PID:2968
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae
-
Filesize
97KB
MD5abb671315a5cf15b18c3c26e05ca1c6f
SHA19304979ca6483bedd45e012e5b243bb58524814c
SHA25661ca1ac6b47cfb9c0e9ff58c9748d45c3b84fc7fac92f19c3fc0981d39f4856e
SHA512334332555d1c995821692cae208e028cc0b768c180bee9e31c8bf01ad65e244f518b5134103941eac1f28ace780044a0332f367fcab22443030bab2d97e5b5ae