Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe
-
Size
69KB
-
MD5
07f058d68b7fadbc0d9b67d596d3e860
-
SHA1
10158a48c498b529684fb525ad8ece2eb9b919b5
-
SHA256
50bfdf56b7719901cff812f2bb45b0c1912913f88d0eaf418a137c3a7708cb53
-
SHA512
39c211eb7b3760264dde9b8af5777e8c665a5e96eec0d6ee780d543abf3a65750247e750d2783a27bffe49e8f2460db253d2cbdd0b93bb9f4182e0fc7542787d
-
SSDEEP
768:OrItKyw5WHXfQmjIiIk9ecAa7pP1VMs96MyX9DdtldE9rIIIwjkMuuuR:Or3Z5IfQmv81a7pP1F3yXFdtnSjPuuuR
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2656 attrib.exe -
Deletes itself 1 IoCs
pid Process 2816 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1380 iuyhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\iuyhost.exe NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe File opened for modification C:\Windows\Debug\iuyhost.exe NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe File opened for modification C:\Windows\Debug\iuyhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 iuyhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz iuyhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2940 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2656 2940 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 27 PID 2940 wrote to memory of 2656 2940 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 27 PID 2940 wrote to memory of 2656 2940 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 27 PID 2940 wrote to memory of 2656 2940 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 27 PID 2940 wrote to memory of 2816 2940 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 30 PID 2940 wrote to memory of 2816 2940 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 30 PID 2940 wrote to memory of 2816 2940 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 30 PID 2940 wrote to memory of 2816 2940 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2656 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\iuyhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2656
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEAS07~1.EXE > nul2⤵
- Deletes itself
PID:2816
-
-
C:\Windows\Debug\iuyhost.exeC:\Windows\Debug\iuyhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD52d506cedad305db04201e865b7b18a37
SHA142a41df5d1e302410d98a209ff2a0c855c39f0fc
SHA256f033858280a83af33fabb9aa13f453af351c44effecb0fb8a9f91bec3c5b3203
SHA51265df623401600d04a855f080129f1bb32114eb6dbbc3882bb3a5a2fcac2883133ffd23b6b46550cefe6b6f99154d36378ac5339697749e403a756c83c55d456c
-
Filesize
69KB
MD52d506cedad305db04201e865b7b18a37
SHA142a41df5d1e302410d98a209ff2a0c855c39f0fc
SHA256f033858280a83af33fabb9aa13f453af351c44effecb0fb8a9f91bec3c5b3203
SHA51265df623401600d04a855f080129f1bb32114eb6dbbc3882bb3a5a2fcac2883133ffd23b6b46550cefe6b6f99154d36378ac5339697749e403a756c83c55d456c