Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fe41a939dd3c2f2eb8833681289a5700.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.fe41a939dd3c2f2eb8833681289a5700.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.fe41a939dd3c2f2eb8833681289a5700.exe
-
Size
3.9MB
-
MD5
fe41a939dd3c2f2eb8833681289a5700
-
SHA1
de69c02e8209acba4e0fed9ed3cfaa4ea0e742e0
-
SHA256
ff8f94fc24dbbeecf0efb07da1cebc0ec0359e1d7a9cf3b898acb543f29fba68
-
SHA512
4480660484ec38a8e82ba5f33e61704548826f31ff04aa624c05fad09909538bbf83e405504a011e13b289603d06d1cfce0efe403c22b7403ecfab7c9a31ed71
-
SSDEEP
98304:MtBS4neHvZjiEO5Ihd1T5HqDXJqNjpzS3vv3jirr3jjWiTaOvifviOrF:crnevd1NHqDXJqNj4
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4272 MSWDM.EXE 3412 MSWDM.EXE 740 NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Wine NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE Key opened \REGISTRY\MACHINE\Software\Wine NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.fe41a939dd3c2f2eb8833681289a5700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.fe41a939dd3c2f2eb8833681289a5700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\Q: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\R: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\U: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\I: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\H: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\K: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\N: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\S: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\Y: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\E: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\M: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\P: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\T: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\V: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\Z: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\J: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\O: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\W: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\X: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE File opened (read-only) \??\G: NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.fe41a939dd3c2f2eb8833681289a5700.exe File opened for modification C:\Windows\dev8FB8.tmp NEAS.fe41a939dd3c2f2eb8833681289a5700.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3412 MSWDM.EXE 3412 MSWDM.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 740 NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4272 4048 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 88 PID 4048 wrote to memory of 4272 4048 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 88 PID 4048 wrote to memory of 4272 4048 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 88 PID 4048 wrote to memory of 3412 4048 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 90 PID 4048 wrote to memory of 3412 4048 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 90 PID 4048 wrote to memory of 3412 4048 NEAS.fe41a939dd3c2f2eb8833681289a5700.exe 90 PID 3412 wrote to memory of 740 3412 MSWDM.EXE 91 PID 3412 wrote to memory of 740 3412 MSWDM.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4272
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev8FB8.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE
- Executes dropped EXE
- Identifies Wine through registry keys
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:740
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev8FB8.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE!3⤵PID:4840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5e8aeeec03e177dc2ed46666d9e6c20a9
SHA1fc7a831a9cb26916d49305f059e67507d9eee938
SHA25607b9d438588acdf0379c33ee35ff6b3df62852ca571919e9eb6f6efd846731ec
SHA51203ed25c73826c585a031e249b0114b444d9bf773cffdd8a1d77501f23aa6e845d63f0b72fc6d0fa5a92af41670f0711746e5f0e30ef278fc3cc6076e383c9999
-
Filesize
3.9MB
MD5e8aeeec03e177dc2ed46666d9e6c20a9
SHA1fc7a831a9cb26916d49305f059e67507d9eee938
SHA25607b9d438588acdf0379c33ee35ff6b3df62852ca571919e9eb6f6efd846731ec
SHA51203ed25c73826c585a031e249b0114b444d9bf773cffdd8a1d77501f23aa6e845d63f0b72fc6d0fa5a92af41670f0711746e5f0e30ef278fc3cc6076e383c9999
-
Filesize
2.3MB
MD5b469c4f9569a6636e40d363033268fd6
SHA1d4882eaf7f42e56e68e06263f46c26d7234fc3e3
SHA25694990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237
SHA512b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15
-
Filesize
3.9MB
MD5e8aeeec03e177dc2ed46666d9e6c20a9
SHA1fc7a831a9cb26916d49305f059e67507d9eee938
SHA25607b9d438588acdf0379c33ee35ff6b3df62852ca571919e9eb6f6efd846731ec
SHA51203ed25c73826c585a031e249b0114b444d9bf773cffdd8a1d77501f23aa6e845d63f0b72fc6d0fa5a92af41670f0711746e5f0e30ef278fc3cc6076e383c9999
-
Filesize
1.6MB
MD5760b4551e14e64bf5b00a56538f939dc
SHA1fbf784e20c484185c28e370308d74bb7d8aaae73
SHA25620daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38
SHA512e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0
-
Filesize
1.6MB
MD5760b4551e14e64bf5b00a56538f939dc
SHA1fbf784e20c484185c28e370308d74bb7d8aaae73
SHA25620daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38
SHA512e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0
-
Filesize
1.6MB
MD5760b4551e14e64bf5b00a56538f939dc
SHA1fbf784e20c484185c28e370308d74bb7d8aaae73
SHA25620daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38
SHA512e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0
-
Filesize
1.6MB
MD5760b4551e14e64bf5b00a56538f939dc
SHA1fbf784e20c484185c28e370308d74bb7d8aaae73
SHA25620daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38
SHA512e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0
-
Filesize
2.3MB
MD5b469c4f9569a6636e40d363033268fd6
SHA1d4882eaf7f42e56e68e06263f46c26d7234fc3e3
SHA25694990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237
SHA512b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15