Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
15/11/2023, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0fd422047b061232cf72e7fd392c1650.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0fd422047b061232cf72e7fd392c1650.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0fd422047b061232cf72e7fd392c1650.exe
-
Size
84KB
-
MD5
0fd422047b061232cf72e7fd392c1650
-
SHA1
4014c08ee550460a82a9fe686c65c49227315cd8
-
SHA256
5f978332e24290efe42766ab9fd2cc7bb0c58e112b06fe3d5337ddcc0685431d
-
SHA512
e941fa288a0186283e442f807305c5700939011621607f022ea86dc5415b8edd5fa98c0d2949d355d5294a3a5cf10ffb7267607628bb63d6b26148c62e90d637
-
SSDEEP
768:5BBdFYDgao5/AUrLEEzayTpBJfxBDlxkFNXK8D1Fojx:5pcC/eAayJ3Rx8y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1736 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command NEAS.0fd422047b061232cf72e7fd392c1650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.0fd422047b061232cf72e7fd392c1650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" NEAS.0fd422047b061232cf72e7fd392c1650.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\notepad¢¬.exe NEAS.0fd422047b061232cf72e7fd392c1650.exe File created C:\Windows\SysWOW64\¢«.exe NEAS.0fd422047b061232cf72e7fd392c1650.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe NEAS.0fd422047b061232cf72e7fd392c1650.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command NEAS.0fd422047b061232cf72e7fd392c1650.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command NEAS.0fd422047b061232cf72e7fd392c1650.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1700035077" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "505" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv NEAS.0fd422047b061232cf72e7fd392c1650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" NEAS.0fd422047b061232cf72e7fd392c1650.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.0fd422047b061232cf72e7fd392c1650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" NEAS.0fd422047b061232cf72e7fd392c1650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" NEAS.0fd422047b061232cf72e7fd392c1650.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1700035077" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1736 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 1736 rundll32.exe 1736 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1736 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 28 PID 1764 wrote to memory of 1736 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 28 PID 1764 wrote to memory of 1736 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 28 PID 1764 wrote to memory of 1736 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 28 PID 1764 wrote to memory of 1736 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 28 PID 1764 wrote to memory of 1736 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 28 PID 1764 wrote to memory of 1736 1764 NEAS.0fd422047b061232cf72e7fd392c1650.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0fd422047b061232cf72e7fd392c1650.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0fd422047b061232cf72e7fd392c1650.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5135df9aa67f110c3b69ba5b7164b979b
SHA1981102a91ad103dbe6f41e79975cf4f083bee7ea
SHA256ac19989e260aef467615852a3a6f99df62e78f90ec59181bb7e21b26a463a430
SHA51224da11ea5e0dd614a1ec2c683983e736d3ab8ee67d0202cfdbfd391f04607a00f8e6d4a6cc06b90504ad99e0ca2db6fc8ce5950ee38f9b0717c5914b4b52bebe
-
Filesize
106KB
MD5135df9aa67f110c3b69ba5b7164b979b
SHA1981102a91ad103dbe6f41e79975cf4f083bee7ea
SHA256ac19989e260aef467615852a3a6f99df62e78f90ec59181bb7e21b26a463a430
SHA51224da11ea5e0dd614a1ec2c683983e736d3ab8ee67d0202cfdbfd391f04607a00f8e6d4a6cc06b90504ad99e0ca2db6fc8ce5950ee38f9b0717c5914b4b52bebe
-
Filesize
106KB
MD5135df9aa67f110c3b69ba5b7164b979b
SHA1981102a91ad103dbe6f41e79975cf4f083bee7ea
SHA256ac19989e260aef467615852a3a6f99df62e78f90ec59181bb7e21b26a463a430
SHA51224da11ea5e0dd614a1ec2c683983e736d3ab8ee67d0202cfdbfd391f04607a00f8e6d4a6cc06b90504ad99e0ca2db6fc8ce5950ee38f9b0717c5914b4b52bebe
-
Filesize
106KB
MD5135df9aa67f110c3b69ba5b7164b979b
SHA1981102a91ad103dbe6f41e79975cf4f083bee7ea
SHA256ac19989e260aef467615852a3a6f99df62e78f90ec59181bb7e21b26a463a430
SHA51224da11ea5e0dd614a1ec2c683983e736d3ab8ee67d0202cfdbfd391f04607a00f8e6d4a6cc06b90504ad99e0ca2db6fc8ce5950ee38f9b0717c5914b4b52bebe
-
Filesize
106KB
MD5135df9aa67f110c3b69ba5b7164b979b
SHA1981102a91ad103dbe6f41e79975cf4f083bee7ea
SHA256ac19989e260aef467615852a3a6f99df62e78f90ec59181bb7e21b26a463a430
SHA51224da11ea5e0dd614a1ec2c683983e736d3ab8ee67d0202cfdbfd391f04607a00f8e6d4a6cc06b90504ad99e0ca2db6fc8ce5950ee38f9b0717c5914b4b52bebe