Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 02:12

General

  • Target

    NEAS.f48fde7e540a888f7cf73e607cf32dc0.exe

  • Size

    1.2MB

  • MD5

    f48fde7e540a888f7cf73e607cf32dc0

  • SHA1

    368b7e840e5e028be9e94e3c85a454fe16b2e2ec

  • SHA256

    1695315c0df6acabe55a5fce3a7fb42f904696512a17078bf6c3b99bdf2ab485

  • SHA512

    a5c076d1e31f8063264be148fb467ba4e9414fedba0aa0055094cf8581d40d170f8883507f1a7fb3d94216969cb61b5697182494c6a753de01fe32f5bee04e55

  • SSDEEP

    24576:6nZaHEunzpoeb2JDMXVv4jg1y+cjvA/RnWp7SnXi2zxkqq:iak8pLbkI54jUyno/R3Xi2iqq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f48fde7e540a888f7cf73e607cf32dc0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f48fde7e540a888f7cf73e607cf32dc0.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3568
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3440
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:208
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1356
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:1204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    1.2MB

    MD5

    6389a342aac7831d19f450a82480ed7f

    SHA1

    e25f3f108296274ca316f04e496f5d79c7f9fa02

    SHA256

    d7fa054c01e8a986a579978f712c2fbfd52c5e5b7a4535499039314544104b1f

    SHA512

    8c309103c34604993ea9fc97eea59caeb477aaa685e9d847b109231fd2749e7a064f11a4497a3c02ad7b222f393f4bcaed9526f02da3665ac03f9e5472f26fed

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.2MB

    MD5

    b357e2ac4967d54f829aeffc8b49e72f

    SHA1

    a3fa17f8ff293b57296396fb8c8a8cbc7143e1b6

    SHA256

    b54ecf36eb6a98312f45cb900334b36c2326235fc4ea3ec873a2479878447b11

    SHA512

    b7d312ebf25a4292a53ee1e30ce04ae273678d268a4df808b99565750941c40eed6919f42d6a8554d146a48644a4541eeaef78c6f477446f1476d8f44ff0af61

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.2MB

    MD5

    b357e2ac4967d54f829aeffc8b49e72f

    SHA1

    a3fa17f8ff293b57296396fb8c8a8cbc7143e1b6

    SHA256

    b54ecf36eb6a98312f45cb900334b36c2326235fc4ea3ec873a2479878447b11

    SHA512

    b7d312ebf25a4292a53ee1e30ce04ae273678d268a4df808b99565750941c40eed6919f42d6a8554d146a48644a4541eeaef78c6f477446f1476d8f44ff0af61

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.2MB

    MD5

    b357e2ac4967d54f829aeffc8b49e72f

    SHA1

    a3fa17f8ff293b57296396fb8c8a8cbc7143e1b6

    SHA256

    b54ecf36eb6a98312f45cb900334b36c2326235fc4ea3ec873a2479878447b11

    SHA512

    b7d312ebf25a4292a53ee1e30ce04ae273678d268a4df808b99565750941c40eed6919f42d6a8554d146a48644a4541eeaef78c6f477446f1476d8f44ff0af61

  • C:\Windows\Resources\svchost.exe

    Filesize

    1.2MB

    MD5

    9f79dd4daa5619a1f47582fbe5286ea4

    SHA1

    8484d1acb01bb072f3a9cb0f78f038eeb17b517e

    SHA256

    f44bc26a40a9efbc68d2af8890add9e94ac63be704d0319ee81f66409d28bdaa

    SHA512

    816f1d483c4ac84126853252718ec7b9240799867432422ee7b30d16797948de323f9324a11c9e687ac70a482503c053e20aaf3ffffc67f216b0423d451b4250

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    1.2MB

    MD5

    b357e2ac4967d54f829aeffc8b49e72f

    SHA1

    a3fa17f8ff293b57296396fb8c8a8cbc7143e1b6

    SHA256

    b54ecf36eb6a98312f45cb900334b36c2326235fc4ea3ec873a2479878447b11

    SHA512

    b7d312ebf25a4292a53ee1e30ce04ae273678d268a4df808b99565750941c40eed6919f42d6a8554d146a48644a4541eeaef78c6f477446f1476d8f44ff0af61

  • \??\c:\windows\resources\svchost.exe

    Filesize

    1.2MB

    MD5

    9f79dd4daa5619a1f47582fbe5286ea4

    SHA1

    8484d1acb01bb072f3a9cb0f78f038eeb17b517e

    SHA256

    f44bc26a40a9efbc68d2af8890add9e94ac63be704d0319ee81f66409d28bdaa

    SHA512

    816f1d483c4ac84126853252718ec7b9240799867432422ee7b30d16797948de323f9324a11c9e687ac70a482503c053e20aaf3ffffc67f216b0423d451b4250

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    1.2MB

    MD5

    6389a342aac7831d19f450a82480ed7f

    SHA1

    e25f3f108296274ca316f04e496f5d79c7f9fa02

    SHA256

    d7fa054c01e8a986a579978f712c2fbfd52c5e5b7a4535499039314544104b1f

    SHA512

    8c309103c34604993ea9fc97eea59caeb477aaa685e9d847b109231fd2749e7a064f11a4497a3c02ad7b222f393f4bcaed9526f02da3665ac03f9e5472f26fed

  • memory/208-34-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1204-29-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1204-33-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-43-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-55-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-65-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-38-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-61-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-41-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-59-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-57-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-53-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-45-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-51-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-47-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/1356-49-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-58-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-42-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-46-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-52-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-44-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-54-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-50-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-36-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-62-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-48-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-56-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-60-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3440-40-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3568-35-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB

  • memory/3568-0-0x0000000000400000-0x0000000000784000-memory.dmp

    Filesize

    3.5MB