Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe
-
Size
234KB
-
MD5
56b78ca784a90d6b721031c1c1fc29d0
-
SHA1
07b6017e9a6eb8bb4bcab746f5855f23084c9a4c
-
SHA256
157751c56a1eb0efd6a9c7cd4466352c3d5fa49b0c2f7dd01f8983548934bcdc
-
SHA512
15bd2b3159b3a2293b8d19276b8b406d08bad41feeabeaa300bed4fe95a8db828c1adbc53f3d058daf2ed97ea07380d50b49e19e0a767c2d0577bab6b282b8fe
-
SSDEEP
6144:xCOYlvFX9SBn76cEU2BE9Ej9f5HYm7H308YC65B:x3Yl5UBnLEUGjjHY635a
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4896 NetCtion.exe 3668 autoclip.exe 3128 ~F898.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caclnet1 = "C:\\Users\\Admin\\AppData\\Roaming\\InfDHost\\NetCtion.exe" NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\autoclip.exe NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4896 NetCtion.exe 4896 NetCtion.exe 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3320 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 4896 NetCtion.exe Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3320 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3272 wrote to memory of 4896 3272 NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe 90 PID 3272 wrote to memory of 4896 3272 NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe 90 PID 3272 wrote to memory of 4896 3272 NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe 90 PID 4896 wrote to memory of 3128 4896 NetCtion.exe 92 PID 4896 wrote to memory of 3128 4896 NetCtion.exe 92 PID 3128 wrote to memory of 3320 3128 ~F898.tmp 43
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.56b78ca784a90d6b721031c1c1fc29d0.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Roaming\InfDHost\NetCtion.exe"C:\Users\Admin\AppData\Roaming\InfDHost"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\~F898.tmp3320 239624 4896 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128
-
-
-
-
C:\Windows\SysWOW64\autoclip.exeC:\Windows\SysWOW64\autoclip.exe -s1⤵
- Executes dropped EXE
PID:3668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
234KB
MD5f62cb2e27aeda579d5c92b2a1141c0a8
SHA11c2dea4fd569e2079276631a30a54b7289f95a1f
SHA25680c99e12e7360af9f41de036677d270928552712a8c256a66e50d76f3dabde79
SHA512ab23d67828fe216d6cf79664fbe01f42f91fc4bbb9eeafb20552959e82164d054741c3d4f0c014cc3d7e0e219dd22342063bb9ebc9ca54befbdd3b8f2c00fa14
-
Filesize
234KB
MD5f62cb2e27aeda579d5c92b2a1141c0a8
SHA11c2dea4fd569e2079276631a30a54b7289f95a1f
SHA25680c99e12e7360af9f41de036677d270928552712a8c256a66e50d76f3dabde79
SHA512ab23d67828fe216d6cf79664fbe01f42f91fc4bbb9eeafb20552959e82164d054741c3d4f0c014cc3d7e0e219dd22342063bb9ebc9ca54befbdd3b8f2c00fa14
-
Filesize
234KB
MD5f62cb2e27aeda579d5c92b2a1141c0a8
SHA11c2dea4fd569e2079276631a30a54b7289f95a1f
SHA25680c99e12e7360af9f41de036677d270928552712a8c256a66e50d76f3dabde79
SHA512ab23d67828fe216d6cf79664fbe01f42f91fc4bbb9eeafb20552959e82164d054741c3d4f0c014cc3d7e0e219dd22342063bb9ebc9ca54befbdd3b8f2c00fa14
-
Filesize
234KB
MD5f62cb2e27aeda579d5c92b2a1141c0a8
SHA11c2dea4fd569e2079276631a30a54b7289f95a1f
SHA25680c99e12e7360af9f41de036677d270928552712a8c256a66e50d76f3dabde79
SHA512ab23d67828fe216d6cf79664fbe01f42f91fc4bbb9eeafb20552959e82164d054741c3d4f0c014cc3d7e0e219dd22342063bb9ebc9ca54befbdd3b8f2c00fa14