Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    8s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    12/11/2023, 09:41

General

  • Target

    NEAS.fe41a939dd3c2f2eb8833681289a5700.exe

  • Size

    3.9MB

  • MD5

    fe41a939dd3c2f2eb8833681289a5700

  • SHA1

    de69c02e8209acba4e0fed9ed3cfaa4ea0e742e0

  • SHA256

    ff8f94fc24dbbeecf0efb07da1cebc0ec0359e1d7a9cf3b898acb543f29fba68

  • SHA512

    4480660484ec38a8e82ba5f33e61704548826f31ff04aa624c05fad09909538bbf83e405504a011e13b289603d06d1cfce0efe403c22b7403ecfab7c9a31ed71

  • SSDEEP

    98304:MtBS4neHvZjiEO5Ihd1T5HqDXJqNjpzS3vv3jirr3jjWiTaOvifviOrF:crnevd1NHqDXJqNj4

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2792
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev8B6E.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE
        3⤵
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Enumerates connected drives
        • Suspicious use of FindShellTrayWindow
        PID:2728
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev8B6E.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE!
        3⤵
          PID:2628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE

      Filesize

      3.9MB

      MD5

      bb4192345781654113d4f6dbf68a9980

      SHA1

      5a4fe02bc23fdb0268e85707732f36f679001e4b

      SHA256

      ae9f8950e236389e1ad196a9fc169309e1f66e295bd8f1494bccd4cb9253ff33

      SHA512

      c1e63279af5d3139303ba6444b29ba8953f00e7b7060140ce58fdc4fe759e1cf1841a63d67612f11b0d55a2c638617aa4446b3d4c2bcac284af5361ffde6bf85

    • C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE

      Filesize

      3.9MB

      MD5

      bb4192345781654113d4f6dbf68a9980

      SHA1

      5a4fe02bc23fdb0268e85707732f36f679001e4b

      SHA256

      ae9f8950e236389e1ad196a9fc169309e1f66e295bd8f1494bccd4cb9253ff33

      SHA512

      c1e63279af5d3139303ba6444b29ba8953f00e7b7060140ce58fdc4fe759e1cf1841a63d67612f11b0d55a2c638617aa4446b3d4c2bcac284af5361ffde6bf85

    • C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe

      Filesize

      2.3MB

      MD5

      b469c4f9569a6636e40d363033268fd6

      SHA1

      d4882eaf7f42e56e68e06263f46c26d7234fc3e3

      SHA256

      94990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237

      SHA512

      b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15

    • C:\WINDOWS\MSWDM.EXE

      Filesize

      1.6MB

      MD5

      760b4551e14e64bf5b00a56538f939dc

      SHA1

      fbf784e20c484185c28e370308d74bb7d8aaae73

      SHA256

      20daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38

      SHA512

      e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0

    • C:\Windows\MSWDM.EXE

      Filesize

      1.6MB

      MD5

      760b4551e14e64bf5b00a56538f939dc

      SHA1

      fbf784e20c484185c28e370308d74bb7d8aaae73

      SHA256

      20daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38

      SHA512

      e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0

    • C:\Windows\MSWDM.EXE

      Filesize

      1.6MB

      MD5

      760b4551e14e64bf5b00a56538f939dc

      SHA1

      fbf784e20c484185c28e370308d74bb7d8aaae73

      SHA256

      20daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38

      SHA512

      e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0

    • C:\Windows\MSWDM.EXE

      Filesize

      1.6MB

      MD5

      760b4551e14e64bf5b00a56538f939dc

      SHA1

      fbf784e20c484185c28e370308d74bb7d8aaae73

      SHA256

      20daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38

      SHA512

      e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0

    • C:\Windows\MSWDM.EXE

      Filesize

      1.6MB

      MD5

      760b4551e14e64bf5b00a56538f939dc

      SHA1

      fbf784e20c484185c28e370308d74bb7d8aaae73

      SHA256

      20daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38

      SHA512

      e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0

    • C:\Windows\dev8B6E.tmp

      Filesize

      2.3MB

      MD5

      b469c4f9569a6636e40d363033268fd6

      SHA1

      d4882eaf7f42e56e68e06263f46c26d7234fc3e3

      SHA256

      94990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237

      SHA512

      b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15

    • \Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe

      Filesize

      2.3MB

      MD5

      b469c4f9569a6636e40d363033268fd6

      SHA1

      d4882eaf7f42e56e68e06263f46c26d7234fc3e3

      SHA256

      94990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237

      SHA512

      b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15

    • \Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe

      Filesize

      2.3MB

      MD5

      b469c4f9569a6636e40d363033268fd6

      SHA1

      d4882eaf7f42e56e68e06263f46c26d7234fc3e3

      SHA256

      94990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237

      SHA512

      b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15

    • \Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe

      Filesize

      2.3MB

      MD5

      b469c4f9569a6636e40d363033268fd6

      SHA1

      d4882eaf7f42e56e68e06263f46c26d7234fc3e3

      SHA256

      94990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237

      SHA512

      b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15

    • memory/2296-2-0x00000000001B0000-0x00000000001C4000-memory.dmp

      Filesize

      80KB

    • memory/2296-8-0x00000000001B0000-0x00000000001C4000-memory.dmp

      Filesize

      80KB

    • memory/2296-0-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2296-13-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2332-17-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2332-36-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2628-34-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2792-18-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB