Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2023, 14:04

General

  • Target

    NEAS.f2110ab4d6630c812a5428384735be80.exe

  • Size

    135KB

  • MD5

    f2110ab4d6630c812a5428384735be80

  • SHA1

    ad0a630ea8f496e26c09864c255feb6b3c0f06b9

  • SHA256

    69d629150b0aef221218b0112ba5693e56bdf02ad1f4ba4bbbdbeecbad1cdd52

  • SHA512

    d618acb0d692bfb871a178a9e58bf47380dc5053af3ea288697a5ee64297db6bf7dfff636c6a13df810d8e9e0c3c996487832ed81b7f942e61cc64008e9672dd

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV9i1OFA:UVqoCl/YgjxEufVU0TbTyDDalDZFA

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f2110ab4d6630c812a5428384735be80.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f2110ab4d6630c812a5428384735be80.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3100
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3908
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3716
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4680
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    c7344acef7fe7ee8959318220b7326e4

    SHA1

    9b82b07eeeb3432474be55f50093125857edab7f

    SHA256

    b355a78b9ba14ddfe96e2b4665a219200c0ffff1b5acbe73d39ca320097f5753

    SHA512

    afb0fb22c740dc2a165c5bb2c24e30bc93cb94e732a865583dbbab26e0981cba3799ddd7d9b672f538a04520cf90362a41251e908685bd441616a85dc4c8dd00

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    a8f24ddd49a17a9c993f4649ac77642c

    SHA1

    78a26e7c550b50fcab6d58192f0688a8d95091c5

    SHA256

    5baf44ac40f104a3b969e38eb6e21942067595fdc37b3e144b5ef9e3eb8cbd23

    SHA512

    1e6c25aa407d19ddcf43b0281db2f7b78c60a51214ff5f7ac088a1d0894f50349f81bc2780e9669255b65f828d69e29178c64ce936dc0ff036e572380668ace5

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    a8f24ddd49a17a9c993f4649ac77642c

    SHA1

    78a26e7c550b50fcab6d58192f0688a8d95091c5

    SHA256

    5baf44ac40f104a3b969e38eb6e21942067595fdc37b3e144b5ef9e3eb8cbd23

    SHA512

    1e6c25aa407d19ddcf43b0281db2f7b78c60a51214ff5f7ac088a1d0894f50349f81bc2780e9669255b65f828d69e29178c64ce936dc0ff036e572380668ace5

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    a8f24ddd49a17a9c993f4649ac77642c

    SHA1

    78a26e7c550b50fcab6d58192f0688a8d95091c5

    SHA256

    5baf44ac40f104a3b969e38eb6e21942067595fdc37b3e144b5ef9e3eb8cbd23

    SHA512

    1e6c25aa407d19ddcf43b0281db2f7b78c60a51214ff5f7ac088a1d0894f50349f81bc2780e9669255b65f828d69e29178c64ce936dc0ff036e572380668ace5

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    aa1fc5ad4481674b222bb9e528b58bd6

    SHA1

    2317c51d3c77b8bbe0abab3427129a5bb96b800e

    SHA256

    40c57a733db480dfd05878fd1445a4fb27548945c6311bc24471165f58c7238f

    SHA512

    a4db856744d57dcb3c996f109911ab89961edae903326c5edee7255fe885a8b944717c8a74d64ca0971d44095a57973849f5cc74d8e91cc1f50dbfb03c09c516

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    135KB

    MD5

    a8f24ddd49a17a9c993f4649ac77642c

    SHA1

    78a26e7c550b50fcab6d58192f0688a8d95091c5

    SHA256

    5baf44ac40f104a3b969e38eb6e21942067595fdc37b3e144b5ef9e3eb8cbd23

    SHA512

    1e6c25aa407d19ddcf43b0281db2f7b78c60a51214ff5f7ac088a1d0894f50349f81bc2780e9669255b65f828d69e29178c64ce936dc0ff036e572380668ace5

  • \??\c:\windows\resources\svchost.exe

    Filesize

    135KB

    MD5

    aa1fc5ad4481674b222bb9e528b58bd6

    SHA1

    2317c51d3c77b8bbe0abab3427129a5bb96b800e

    SHA256

    40c57a733db480dfd05878fd1445a4fb27548945c6311bc24471165f58c7238f

    SHA512

    a4db856744d57dcb3c996f109911ab89961edae903326c5edee7255fe885a8b944717c8a74d64ca0971d44095a57973849f5cc74d8e91cc1f50dbfb03c09c516

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    135KB

    MD5

    c7344acef7fe7ee8959318220b7326e4

    SHA1

    9b82b07eeeb3432474be55f50093125857edab7f

    SHA256

    b355a78b9ba14ddfe96e2b4665a219200c0ffff1b5acbe73d39ca320097f5753

    SHA512

    afb0fb22c740dc2a165c5bb2c24e30bc93cb94e732a865583dbbab26e0981cba3799ddd7d9b672f538a04520cf90362a41251e908685bd441616a85dc4c8dd00

  • memory/3100-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3100-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3716-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3908-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4680-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4876-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB