Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe
-
Size
209KB
-
MD5
da17f83d947f741ec61df2a41182b1d0
-
SHA1
c62ed6ecf822fa1cbd194577b644fcaa4129d34e
-
SHA256
aa723f86bd0a2ba235b7422e8956ec88a6b0eb389d43e919875253b9e0465d52
-
SHA512
478f82cab4cc9a7be3f9bc05daab88f41355ac485bef702ee6ce6470871677ad55ada018b675590caa0e3925940b0b59390a5d2d683777d0ce7393cfad003ccb
-
SSDEEP
3072:rQcjk9tVRNIcjb4Ryfjijjx14hdeCXHKPJFo9zpE7Di0X0JuLL+o7BlpF9e:rQh9tVRm2kh34hdeCkcG7DEALLlnN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2448 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2360 NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe 2360 NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe -
resource yara_rule behavioral1/memory/2360-1-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2360-16-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2448-18-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2448-40-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\6f806792 = "C:\\Windows\\apppatch\\svchost.exe" NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\6f806792 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe File opened for modification C:\Windows\apppatch\svchost.exe NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2360 NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2448 2360 NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe 28 PID 2360 wrote to memory of 2448 2360 NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe 28 PID 2360 wrote to memory of 2448 2360 NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe 28 PID 2360 wrote to memory of 2448 2360 NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.da17f83d947f741ec61df2a41182b1d0_JC.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5ca9de96320480328f2a5699f3bfd501a
SHA1b07491f18bb1909dc2600ff9befc0283ca3d32d5
SHA256b5af2cdf11e639906f4dc057de44fdde2376c6a4f1b0d414f17d8c49be0f1d08
SHA512396a14aa93dae00b984a658cdf7dd51950098507b3eb71e94c366575591ba053a43329907558cffba39ab1c238ab38a9ba74f469909ef013e010e76e277cb5fa
-
Filesize
209KB
MD5ca9de96320480328f2a5699f3bfd501a
SHA1b07491f18bb1909dc2600ff9befc0283ca3d32d5
SHA256b5af2cdf11e639906f4dc057de44fdde2376c6a4f1b0d414f17d8c49be0f1d08
SHA512396a14aa93dae00b984a658cdf7dd51950098507b3eb71e94c366575591ba053a43329907558cffba39ab1c238ab38a9ba74f469909ef013e010e76e277cb5fa
-
Filesize
209KB
MD5ca9de96320480328f2a5699f3bfd501a
SHA1b07491f18bb1909dc2600ff9befc0283ca3d32d5
SHA256b5af2cdf11e639906f4dc057de44fdde2376c6a4f1b0d414f17d8c49be0f1d08
SHA512396a14aa93dae00b984a658cdf7dd51950098507b3eb71e94c366575591ba053a43329907558cffba39ab1c238ab38a9ba74f469909ef013e010e76e277cb5fa
-
Filesize
209KB
MD5ca9de96320480328f2a5699f3bfd501a
SHA1b07491f18bb1909dc2600ff9befc0283ca3d32d5
SHA256b5af2cdf11e639906f4dc057de44fdde2376c6a4f1b0d414f17d8c49be0f1d08
SHA512396a14aa93dae00b984a658cdf7dd51950098507b3eb71e94c366575591ba053a43329907558cffba39ab1c238ab38a9ba74f469909ef013e010e76e277cb5fa
-
Filesize
209KB
MD5ca9de96320480328f2a5699f3bfd501a
SHA1b07491f18bb1909dc2600ff9befc0283ca3d32d5
SHA256b5af2cdf11e639906f4dc057de44fdde2376c6a4f1b0d414f17d8c49be0f1d08
SHA512396a14aa93dae00b984a658cdf7dd51950098507b3eb71e94c366575591ba053a43329907558cffba39ab1c238ab38a9ba74f469909ef013e010e76e277cb5fa