Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2023, 20:00

General

  • Target

    NEAS.4a23f7c70d80bd12a07c463783b72120_JC.exe

  • Size

    135KB

  • MD5

    4a23f7c70d80bd12a07c463783b72120

  • SHA1

    116821b3147601c7605218a02e920e07238d199e

  • SHA256

    b3de53d4867b951188d42690f40c29709d295e471314920955e9fd7bdc179b19

  • SHA512

    7524fb8df27887f6660209378daafe96bc998b912ac2120f0f7e9be53c0358803dd32c68dcadb4f4dde8fc97c645de01df8c9e88f328a3ed3bce08ea57d63c47

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbViSM:UVqoCl/YgjxEufVU0TbTyDDal/M

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.4a23f7c70d80bd12a07c463783b72120_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.4a23f7c70d80bd12a07c463783b72120_JC.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2444
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2516
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3408
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4680
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    b996aa114410a0e39262b9ac281f8c91

    SHA1

    9e2da39006de35c0e8f46994ab0e476aeb6454ce

    SHA256

    fde868567575126826550478f4ca4ee33f0cd2017d893c61a8595a0fd9c4ce7b

    SHA512

    db7edbce8cdd968546f36843f447c257ab84ed552c5ae8341bfe245b996f9d57d851a378111b4ead241a042d9ce01d99ce8a422fbfeb31e289ba21f38dcc78e0

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    a91bfbd67fcf83424c7e670b088fbffa

    SHA1

    766831522b4938daef31fd3d6f03e00894d8c2bf

    SHA256

    047457f4282ef49b971c7106a9e80ae28da3f446ca0cd4ae5d95b15fff76b2ac

    SHA512

    c0f75b658801e2875c09153e4469502c2845934e34e20c8420e8f1a676dba35ad711a9b7921e0fc52a2aa6f5df32ac0dc95eaf2105257bd12bd152a71c378da3

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    a91bfbd67fcf83424c7e670b088fbffa

    SHA1

    766831522b4938daef31fd3d6f03e00894d8c2bf

    SHA256

    047457f4282ef49b971c7106a9e80ae28da3f446ca0cd4ae5d95b15fff76b2ac

    SHA512

    c0f75b658801e2875c09153e4469502c2845934e34e20c8420e8f1a676dba35ad711a9b7921e0fc52a2aa6f5df32ac0dc95eaf2105257bd12bd152a71c378da3

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    a91bfbd67fcf83424c7e670b088fbffa

    SHA1

    766831522b4938daef31fd3d6f03e00894d8c2bf

    SHA256

    047457f4282ef49b971c7106a9e80ae28da3f446ca0cd4ae5d95b15fff76b2ac

    SHA512

    c0f75b658801e2875c09153e4469502c2845934e34e20c8420e8f1a676dba35ad711a9b7921e0fc52a2aa6f5df32ac0dc95eaf2105257bd12bd152a71c378da3

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    9ad3650be849f4e9fee1487789805702

    SHA1

    30e072301ba7c94005929788d47f15b0821e2cd5

    SHA256

    d6220eecb294a769a113b9adbe46302b6e0f44f3b02a7d45c144ac96cf2d7114

    SHA512

    4bffc5dfc48f413cfb0d339b12c6ae1c6a421dae4f72895376b196392c266e7d5f5499f33f754b40174d181f51fde4a1448b9ed1cc8fc3330e11132e48cbc9a5

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    135KB

    MD5

    a91bfbd67fcf83424c7e670b088fbffa

    SHA1

    766831522b4938daef31fd3d6f03e00894d8c2bf

    SHA256

    047457f4282ef49b971c7106a9e80ae28da3f446ca0cd4ae5d95b15fff76b2ac

    SHA512

    c0f75b658801e2875c09153e4469502c2845934e34e20c8420e8f1a676dba35ad711a9b7921e0fc52a2aa6f5df32ac0dc95eaf2105257bd12bd152a71c378da3

  • \??\c:\windows\resources\svchost.exe

    Filesize

    135KB

    MD5

    9ad3650be849f4e9fee1487789805702

    SHA1

    30e072301ba7c94005929788d47f15b0821e2cd5

    SHA256

    d6220eecb294a769a113b9adbe46302b6e0f44f3b02a7d45c144ac96cf2d7114

    SHA512

    4bffc5dfc48f413cfb0d339b12c6ae1c6a421dae4f72895376b196392c266e7d5f5499f33f754b40174d181f51fde4a1448b9ed1cc8fc3330e11132e48cbc9a5

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    135KB

    MD5

    b996aa114410a0e39262b9ac281f8c91

    SHA1

    9e2da39006de35c0e8f46994ab0e476aeb6454ce

    SHA256

    fde868567575126826550478f4ca4ee33f0cd2017d893c61a8595a0fd9c4ce7b

    SHA512

    db7edbce8cdd968546f36843f447c257ab84ed552c5ae8341bfe245b996f9d57d851a378111b4ead241a042d9ce01d99ce8a422fbfeb31e289ba21f38dcc78e0

  • memory/1016-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2444-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2444-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2516-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3408-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4680-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB