Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2023, 16:44

General

  • Target

    NEAS.79e4ff7e07ef027149bee83fa1615910.exe

  • Size

    568KB

  • MD5

    79e4ff7e07ef027149bee83fa1615910

  • SHA1

    89c552505738eeb20376788de9b80d2bf3b941c3

  • SHA256

    41971e0f60de2d25dc70c6cab9acb668a6f643e08f98a993f51c27159769342c

  • SHA512

    5334832dfeae54af3a6c0d62916187b44f4ab967fa13f6b5698db56566e6e789f9b8bf700b1d083c292a4ab0391bd36da47b98893b2815dce2a29900562b6f43

  • SSDEEP

    12288:1mnsl+4bSDyoJMRhxgrO12i+4f0c5/3wb:1mx4bwTJM1N2Kc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.79e4ff7e07ef027149bee83fa1615910.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.79e4ff7e07ef027149bee83fa1615910.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2880
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2888
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:924
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1700
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2604
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2900
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275463 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    572KB

    MD5

    2e0d1dadd967fbda7c0d33b7e81a9943

    SHA1

    59b27696701eafcf9ea39d2e2561d86e8cf871f9

    SHA256

    65579cf579f0a2ca37c4424fd3eca76b6d2aa746d70cf26ff992566d08775b00

    SHA512

    e6aa4bf8996e16d2d63399dad76219e7be29d05c1ae5e494af4a17ff6ce728023ae842b93b3b53d9aba5e8559c2f1c6adb821267cc5605d271f262d1f9294588

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    572KB

    MD5

    2e0d1dadd967fbda7c0d33b7e81a9943

    SHA1

    59b27696701eafcf9ea39d2e2561d86e8cf871f9

    SHA256

    65579cf579f0a2ca37c4424fd3eca76b6d2aa746d70cf26ff992566d08775b00

    SHA512

    e6aa4bf8996e16d2d63399dad76219e7be29d05c1ae5e494af4a17ff6ce728023ae842b93b3b53d9aba5e8559c2f1c6adb821267cc5605d271f262d1f9294588

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    572KB

    MD5

    2e0d1dadd967fbda7c0d33b7e81a9943

    SHA1

    59b27696701eafcf9ea39d2e2561d86e8cf871f9

    SHA256

    65579cf579f0a2ca37c4424fd3eca76b6d2aa746d70cf26ff992566d08775b00

    SHA512

    e6aa4bf8996e16d2d63399dad76219e7be29d05c1ae5e494af4a17ff6ce728023ae842b93b3b53d9aba5e8559c2f1c6adb821267cc5605d271f262d1f9294588

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4975d3299011724c4e563ab16b9d59ef

    SHA1

    bdb9baa619e52c0f8cb9fcab2d6819c08966f962

    SHA256

    97253a5401c16b693e06d61bc1dc13e847b79c2ca4850188ae94f0f44411e818

    SHA512

    68e00d762cbe4c9952260722be83d7892ce5f8f4a782228d7dc1ccc928cbad897a4d223d4a30ae47b5b740cb8d9cfefcccbd85dc8e7393865457a686b1682003

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3e27a36acdebd93a37a9d6a2fc8fb6b1

    SHA1

    1b65ddf593d4e4a1530a8cdf5253b98685a77e71

    SHA256

    5f9077820a824d1cfea229fad05dc48429b4f66e891cde93bda002b1db28cce1

    SHA512

    f6f0dcddc4483d158f11b6c4decaa14010058e03ac36b925695c256ab71b16a92a82de37f6e176a256d0ba9d6ad262714bd618c9c502247837e10483ef6219f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1218d53852e02282fa6ede04a6fc17d8

    SHA1

    2ba3bd76b9fd087b44b58e41d9614408cbac3a4c

    SHA256

    cb797525df3f235a12aa9484f471a469df254a006cd0681e6076cc462187c5dc

    SHA512

    b5a48d420195ff41cca18ff5f02c864ca41b74870d310c412a0163f7b190913528f971729ab1f26c79f095c871e3c2b41206953a32fc9defee2ad292a41d1b1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6804b014c8484f390067f53ff3c9ad61

    SHA1

    7f2479ab0275fbeb7efdfbe07a869e8bccb8e6cc

    SHA256

    3fc52cc367a97785ea3b47faa8aa33f82e7e2fbf6898ea4a76fd0279ee3600c3

    SHA512

    a3a68a08d2b6f6257ef6a46664f80ff52c4f2c6d8f030fba2d3855e7defdf5f9a333b659ca48a46b0f8ac183ff8830b2e7818fb5e433ea65f6da30545694df88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4092545b4cb5bda615ff1532b998285

    SHA1

    c2f1e0bf85b6873a5164a42546f135dbb7e81a20

    SHA256

    554e11d17839519eecf2fdb0ad62827f2ae7017e1b9162ca8813a54369cd0633

    SHA512

    5924a519d7298b5b38a470ba1c1f9accb4b6644b860b94c97e308d0c8025d4c2c323dbd3d0f9cbb37837a339dfb06b1ac0a957b3054e0d59a88fbc47c9376a5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    496ea4da5b0e9e4943818cd5b5fd97f2

    SHA1

    6a2509984450853934a9599c8833323fe36d3a4a

    SHA256

    a9b98af69a79681f2b3bd78828be1a83a9cf6920cabe0e03c409543de5a9da7e

    SHA512

    135864873b3a5a7139e53fe2ca056cecf7c05035f0d9b34cdd2cec9200ed0e55329352d978077ad2e287cb698c4b8e481418ba35aefd17cf6a2b56a09551301e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4bb4bffd4afeae58e45e7ef57a7601b8

    SHA1

    0e022f3da1ced2e239530dafcd5b3b9c23fe6309

    SHA256

    e33f693432c4ef8e17906ec9509a46a3be0027f2f285cad76fff292ada2c5b7f

    SHA512

    540645239e8f143834c4d30748c5c7117cac86425560bc182a00ea30d85fedb53ba8607d16d03ef1eae7a3baabacdce274f2bb5968432fd23b50c15bbc2d1035

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8efb3896f3451dc4da27c17d80cc27c8

    SHA1

    fd93018e7018f9c11d3cdabb89a3484140797ad6

    SHA256

    a8a32718cf8e98a20f24e24471bf3fd864600956879c0fe152192dc3ef48a4e4

    SHA512

    445c2fad46526d84f8e3547ddbbec5232325a064a71725099abec1e52142ae2b5ba3b4c07c8d3cc24db0635fbdc0a24ac25cf0d158a4a7c820332638fa7641b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b3e5a6cf8d32e6f995c7919f720bbf1

    SHA1

    883ae442377a11ed106ce422cd1c9e0a3d36048c

    SHA256

    db478d0fed686382517440fdc57d698265af2b0f842f78e7a7e4fda42e8ccd49

    SHA512

    ef753ca68c3ca2896fe41a9555c6551bea08a3d7a0dc5eb718c57bfb4cb651d48a012625dba024c73bbd0aa99659a528249e110ce0c0bcb351ecd1d21a41ef7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1ee56a53792828f02a9430e7dc6cb4ab

    SHA1

    6face4fc34c91442a6c5de5b8a6c69e329c81565

    SHA256

    3d1e0fe032da22fd8cfee70f5a1361e43c62853c4adc080fd4601a45e7dd96b7

    SHA512

    e16a971248fd542e09a6fbf79f4c60021338a07a8d22be148c5b686dc694c33b3367db945ba56dbe801bd8e4c5e08e011dfe634ef24fedcaf9118643a99d1ad5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94b30ab61064b20347444d9851ded114

    SHA1

    3266862f2c887e4bd59aa12f3a09e526585a9c47

    SHA256

    f8ff9c11944f6cc7eb6cc010c9c4fef776e8e3b08a29a99d03a0de04a8275b38

    SHA512

    88ec22dedcb7f466a2390f1c7c65dc2fff1e17afb3fac3c1cfad6b5ea1782d829da01df4e02246dc75bcaaab8bba0753d66e799a83e491fd10136eee7ce1974a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    937ad8557da0d1a3f1ddf468c16365b9

    SHA1

    d09b5edf590b20b405759eb76bafd9f76ca42c0a

    SHA256

    4c885b4771993b47017e2c8d2bb77aa4a52aab1ce39218ed1812e78f33920902

    SHA512

    72a1791070624f3aaab143c826646e1d1ae9ee4171498022c0ca97131d143ee8a9a384da395aff1298bc6bd6673fa2c56550d90c55b14b6a2893a6bc89bd55a4

  • C:\Users\Admin\AppData\Local\Temp\CabF9BA.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar2291.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    575KB

    MD5

    6472a462e4ff42c79a5e5ef5734f3d01

    SHA1

    cf2ab7e0327f492b7dcf78ef06a2530ecd940c0b

    SHA256

    44bd4a8729c8b6d0947e04a2ea5a96be3ca4e90c9fd2866356695e37eee081b4

    SHA512

    672d1270356858396e582d0c992267b4841589b0df86cb2be03a51d4ccb4f04537937be3e904b0c6c27ec5780c14cdffa126b769babd421f4fb1b382e135bc62

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    575KB

    MD5

    6472a462e4ff42c79a5e5ef5734f3d01

    SHA1

    cf2ab7e0327f492b7dcf78ef06a2530ecd940c0b

    SHA256

    44bd4a8729c8b6d0947e04a2ea5a96be3ca4e90c9fd2866356695e37eee081b4

    SHA512

    672d1270356858396e582d0c992267b4841589b0df86cb2be03a51d4ccb4f04537937be3e904b0c6c27ec5780c14cdffa126b769babd421f4fb1b382e135bc62

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    575KB

    MD5

    6472a462e4ff42c79a5e5ef5734f3d01

    SHA1

    cf2ab7e0327f492b7dcf78ef06a2530ecd940c0b

    SHA256

    44bd4a8729c8b6d0947e04a2ea5a96be3ca4e90c9fd2866356695e37eee081b4

    SHA512

    672d1270356858396e582d0c992267b4841589b0df86cb2be03a51d4ccb4f04537937be3e904b0c6c27ec5780c14cdffa126b769babd421f4fb1b382e135bc62

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YQNZB3ME18XJ6G7YQMYW.temp

    Filesize

    3KB

    MD5

    dde125bc079b9e83cf01e0f937ecce46

    SHA1

    4c1aafde32eaaf594e4717d1e55510b6916b8ad0

    SHA256

    25690adecc311de485ff4048bd1e40a906d5aa430f9cef60f26aed5276f3801d

    SHA512

    c478e4d6e28fab360941d21e32b13d520430cc45b431bd5d3644389314ad8a8610ba9607b2f78bb6f57b797ef62b236abc1390c07bdefc5279ed039053bfb8f1

  • \??\c:\program files (x86)\adobe\acrotray.exe

    Filesize

    579KB

    MD5

    ca2a9b21d2b3379b3fff25189ed9fc1c

    SHA1

    a17b496c2f9c885591d2f9d6a7af08b193a87f9c

    SHA256

    3fc506a008cea73fb8b2bf7ce08f6cf93b58a164c2b0f7c13c8f87327edcce57

    SHA512

    65e35a8d28bd5bcc790ac0c744a4ff16d1aedc0414a38e27f26164847f47d2230270cabb940cfd05d4fa4805d6b30d03b1c3f8b06efcd3d31f0ce9cd7c8d61aa

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    578KB

    MD5

    cda1e8ed41a19159eca9fcd02c4bc7d4

    SHA1

    c10342685f1e90c0e4d7b95cdb16f67e4fd3618c

    SHA256

    29f0ef154bd191dbfd641bc3e62f12cfe9036e38d9de342a68ea7ba027fa6623

    SHA512

    fb27b3edf826685862ce0d770a337c7f60ce479baa44701e233e9b926d2e2f4c01fd5ac88e5681520437f2da2e947d136ca4fb0ea6a2e13040563e9147ea46d4

  • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe

    Filesize

    575KB

    MD5

    6472a462e4ff42c79a5e5ef5734f3d01

    SHA1

    cf2ab7e0327f492b7dcf78ef06a2530ecd940c0b

    SHA256

    44bd4a8729c8b6d0947e04a2ea5a96be3ca4e90c9fd2866356695e37eee081b4

    SHA512

    672d1270356858396e582d0c992267b4841589b0df86cb2be03a51d4ccb4f04537937be3e904b0c6c27ec5780c14cdffa126b769babd421f4fb1b382e135bc62

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    572KB

    MD5

    2e0d1dadd967fbda7c0d33b7e81a9943

    SHA1

    59b27696701eafcf9ea39d2e2561d86e8cf871f9

    SHA256

    65579cf579f0a2ca37c4424fd3eca76b6d2aa746d70cf26ff992566d08775b00

    SHA512

    e6aa4bf8996e16d2d63399dad76219e7be29d05c1ae5e494af4a17ff6ce728023ae842b93b3b53d9aba5e8559c2f1c6adb821267cc5605d271f262d1f9294588

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    572KB

    MD5

    2e0d1dadd967fbda7c0d33b7e81a9943

    SHA1

    59b27696701eafcf9ea39d2e2561d86e8cf871f9

    SHA256

    65579cf579f0a2ca37c4424fd3eca76b6d2aa746d70cf26ff992566d08775b00

    SHA512

    e6aa4bf8996e16d2d63399dad76219e7be29d05c1ae5e494af4a17ff6ce728023ae842b93b3b53d9aba5e8559c2f1c6adb821267cc5605d271f262d1f9294588

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    572KB

    MD5

    2e0d1dadd967fbda7c0d33b7e81a9943

    SHA1

    59b27696701eafcf9ea39d2e2561d86e8cf871f9

    SHA256

    65579cf579f0a2ca37c4424fd3eca76b6d2aa746d70cf26ff992566d08775b00

    SHA512

    e6aa4bf8996e16d2d63399dad76219e7be29d05c1ae5e494af4a17ff6ce728023ae842b93b3b53d9aba5e8559c2f1c6adb821267cc5605d271f262d1f9294588

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    575KB

    MD5

    6472a462e4ff42c79a5e5ef5734f3d01

    SHA1

    cf2ab7e0327f492b7dcf78ef06a2530ecd940c0b

    SHA256

    44bd4a8729c8b6d0947e04a2ea5a96be3ca4e90c9fd2866356695e37eee081b4

    SHA512

    672d1270356858396e582d0c992267b4841589b0df86cb2be03a51d4ccb4f04537937be3e904b0c6c27ec5780c14cdffa126b769babd421f4fb1b382e135bc62

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    575KB

    MD5

    6472a462e4ff42c79a5e5ef5734f3d01

    SHA1

    cf2ab7e0327f492b7dcf78ef06a2530ecd940c0b

    SHA256

    44bd4a8729c8b6d0947e04a2ea5a96be3ca4e90c9fd2866356695e37eee081b4

    SHA512

    672d1270356858396e582d0c992267b4841589b0df86cb2be03a51d4ccb4f04537937be3e904b0c6c27ec5780c14cdffa126b769babd421f4fb1b382e135bc62

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    575KB

    MD5

    6472a462e4ff42c79a5e5ef5734f3d01

    SHA1

    cf2ab7e0327f492b7dcf78ef06a2530ecd940c0b

    SHA256

    44bd4a8729c8b6d0947e04a2ea5a96be3ca4e90c9fd2866356695e37eee081b4

    SHA512

    672d1270356858396e582d0c992267b4841589b0df86cb2be03a51d4ccb4f04537937be3e904b0c6c27ec5780c14cdffa126b769babd421f4fb1b382e135bc62

  • memory/2604-35-0x0000000000340000-0x0000000000342000-memory.dmp

    Filesize

    8KB

  • memory/2880-0-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2888-56-0x0000000000360000-0x0000000000362000-memory.dmp

    Filesize

    8KB

  • memory/2888-22-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB