Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15/11/2023, 05:46
Behavioral task
behavioral1
Sample
NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe
-
Size
310KB
-
MD5
ac31b3fb32daf878d07982b5ca8e4b20
-
SHA1
eecada0e6aa8ad9332ef9a2d9207f5fee0847071
-
SHA256
1ef8e5c6dc1a1cff1c321c41c3658171957726f334e989281af1916e2b4b1707
-
SHA512
320b4b1035de51e90fb8e430d5cafdc21cede5d3ccebb9c18dbe262940f90c9c81d1eda632c51da6519586fb2e6aefb21a10af55124365db75ae65ae73e64bf0
-
SSDEEP
6144:m7GfBcQhadAdQNLSNoSMuAfo3ySJ/xBSsKtB/H0CV1I4tiAyr:m7GfBcQodAdQQNoSMjybQPpH0d4kvr
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2268-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/2268-4-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 25 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 7e0074001c0043465346160031000000000057570f91122041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f3c0008000400efbe57570e9157570f912a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000042000000 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4a003100000000006f57d62d102054656d700000360008000400efbe57570e916f57d62d2a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 4c003100000000005757f19310204c6f63616c00380008000400efbe57570e915757f1932a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2268 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2008 2268 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe 28 PID 2268 wrote to memory of 2008 2268 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe 28 PID 2268 wrote to memory of 2008 2268 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe 28 PID 2268 wrote to memory of 2008 2268 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2008
-