Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
8s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fe41a939dd3c2f2eb8833681289a5700.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.fe41a939dd3c2f2eb8833681289a5700.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.fe41a939dd3c2f2eb8833681289a5700.exe
-
Size
3.9MB
-
MD5
fe41a939dd3c2f2eb8833681289a5700
-
SHA1
de69c02e8209acba4e0fed9ed3cfaa4ea0e742e0
-
SHA256
ff8f94fc24dbbeecf0efb07da1cebc0ec0359e1d7a9cf3b898acb543f29fba68
-
SHA512
4480660484ec38a8e82ba5f33e61704548826f31ff04aa624c05fad09909538bbf83e405504a011e13b289603d06d1cfce0efe403c22b7403ecfab7c9a31ed71
-
SSDEEP
98304:MtBS4neHvZjiEO5Ihd1T5HqDXJqNjpzS3vv3jirr3jjWiTaOvifviOrF:crnevd1NHqDXJqNj4
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2792 MSWDM.EXE 2332 MSWDM.EXE 2728 NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE 1224 Process not Found -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Wine NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE Key opened \REGISTRY\MACHINE\Software\Wine NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE -
Loads dropped DLL 2 IoCs
pid Process 2332 MSWDM.EXE 1224 Process not Found -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.fe41a939dd3c2f2eb8833681289a5700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.fe41a939dd3c2f2eb8833681289a5700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\Y: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\Z: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\K: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\O: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\U: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\J: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\R: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\L: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\P: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\Q: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\T: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\W: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\E: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\G: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\I: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\S: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\V: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\H: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\M: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\N: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.fe41a939dd3c2f2eb8833681289a5700.exe File opened for modification C:\Windows\dev8B6E.tmp NEAS.fe41a939dd3c2f2eb8833681289a5700.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2332 MSWDM.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2792 2296 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 28 PID 2296 wrote to memory of 2792 2296 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 28 PID 2296 wrote to memory of 2792 2296 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 28 PID 2296 wrote to memory of 2792 2296 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 28 PID 2296 wrote to memory of 2332 2296 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 29 PID 2296 wrote to memory of 2332 2296 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 29 PID 2296 wrote to memory of 2332 2296 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 29 PID 2296 wrote to memory of 2332 2296 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 29 PID 2332 wrote to memory of 2728 2332 MSWDM.EXE 30 PID 2332 wrote to memory of 2728 2332 MSWDM.EXE 30 PID 2332 wrote to memory of 2728 2332 MSWDM.EXE 30 PID 2332 wrote to memory of 2728 2332 MSWDM.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2792
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev8B6E.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE
- Executes dropped EXE
- Identifies Wine through registry keys
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:2728
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev8B6E.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE!3⤵PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5bb4192345781654113d4f6dbf68a9980
SHA15a4fe02bc23fdb0268e85707732f36f679001e4b
SHA256ae9f8950e236389e1ad196a9fc169309e1f66e295bd8f1494bccd4cb9253ff33
SHA512c1e63279af5d3139303ba6444b29ba8953f00e7b7060140ce58fdc4fe759e1cf1841a63d67612f11b0d55a2c638617aa4446b3d4c2bcac284af5361ffde6bf85
-
Filesize
3.9MB
MD5bb4192345781654113d4f6dbf68a9980
SHA15a4fe02bc23fdb0268e85707732f36f679001e4b
SHA256ae9f8950e236389e1ad196a9fc169309e1f66e295bd8f1494bccd4cb9253ff33
SHA512c1e63279af5d3139303ba6444b29ba8953f00e7b7060140ce58fdc4fe759e1cf1841a63d67612f11b0d55a2c638617aa4446b3d4c2bcac284af5361ffde6bf85
-
Filesize
2.3MB
MD5b469c4f9569a6636e40d363033268fd6
SHA1d4882eaf7f42e56e68e06263f46c26d7234fc3e3
SHA25694990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237
SHA512b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15
-
Filesize
1.6MB
MD5760b4551e14e64bf5b00a56538f939dc
SHA1fbf784e20c484185c28e370308d74bb7d8aaae73
SHA25620daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38
SHA512e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0
-
Filesize
1.6MB
MD5760b4551e14e64bf5b00a56538f939dc
SHA1fbf784e20c484185c28e370308d74bb7d8aaae73
SHA25620daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38
SHA512e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0
-
Filesize
1.6MB
MD5760b4551e14e64bf5b00a56538f939dc
SHA1fbf784e20c484185c28e370308d74bb7d8aaae73
SHA25620daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38
SHA512e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0
-
Filesize
1.6MB
MD5760b4551e14e64bf5b00a56538f939dc
SHA1fbf784e20c484185c28e370308d74bb7d8aaae73
SHA25620daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38
SHA512e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0
-
Filesize
1.6MB
MD5760b4551e14e64bf5b00a56538f939dc
SHA1fbf784e20c484185c28e370308d74bb7d8aaae73
SHA25620daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38
SHA512e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0
-
Filesize
2.3MB
MD5b469c4f9569a6636e40d363033268fd6
SHA1d4882eaf7f42e56e68e06263f46c26d7234fc3e3
SHA25694990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237
SHA512b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15
-
Filesize
2.3MB
MD5b469c4f9569a6636e40d363033268fd6
SHA1d4882eaf7f42e56e68e06263f46c26d7234fc3e3
SHA25694990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237
SHA512b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15
-
Filesize
2.3MB
MD5b469c4f9569a6636e40d363033268fd6
SHA1d4882eaf7f42e56e68e06263f46c26d7234fc3e3
SHA25694990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237
SHA512b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15
-
Filesize
2.3MB
MD5b469c4f9569a6636e40d363033268fd6
SHA1d4882eaf7f42e56e68e06263f46c26d7234fc3e3
SHA25694990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237
SHA512b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15