Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
213s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15/11/2023, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.06e39601dade42d7f2afdcc5e1d18885.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.06e39601dade42d7f2afdcc5e1d18885.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.06e39601dade42d7f2afdcc5e1d18885.exe
-
Size
3.3MB
-
MD5
06e39601dade42d7f2afdcc5e1d18885
-
SHA1
dbfab9aac699a55c0de4f2c529ff5255d4bbc58e
-
SHA256
9be5390217c892e0c188238eb99c1e6191d82560d4a5548b843b28e13ace673d
-
SHA512
352aaed4a9a1ad7464686cedefa059928af52aad1192a4760f03ebfe3c8654a54198a4bfdb401ad0450c5c58ebc9e870a4bca183d29f3bfc69aeac9b52d009f3
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBYB/bSqz8b6LNXJqI20tq/:sxX7QnxrloE5dpUprbVz8eLFcz1/
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe NEAS.06e39601dade42d7f2afdcc5e1d18885.exe -
Executes dropped EXE 2 IoCs
pid Process 2492 ecaopti.exe 2592 aoptiec.exe -
Loads dropped DLL 2 IoCs
pid Process 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe2A\\aoptiec.exe" NEAS.06e39601dade42d7f2afdcc5e1d18885.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintP6\\optixec.exe" NEAS.06e39601dade42d7f2afdcc5e1d18885.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe 2492 ecaopti.exe 2592 aoptiec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2492 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 29 PID 2524 wrote to memory of 2492 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 29 PID 2524 wrote to memory of 2492 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 29 PID 2524 wrote to memory of 2492 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 29 PID 2524 wrote to memory of 2592 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 30 PID 2524 wrote to memory of 2592 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 30 PID 2524 wrote to memory of 2592 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 30 PID 2524 wrote to memory of 2592 2524 NEAS.06e39601dade42d7f2afdcc5e1d18885.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.06e39601dade42d7f2afdcc5e1d18885.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.06e39601dade42d7f2afdcc5e1d18885.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecaopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Adobe2A\aoptiec.exeC:\Adobe2A\aoptiec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD580ccf487954ed870afbfc1a4e06bf598
SHA14eba80cc72a33d6e6e44656f5d71f88e66c6b8eb
SHA256f20da98d54ef8e20a1478fce388040b106cee2c6dd804eb6910811b73541cdbd
SHA51211f714bc933241e084258172716eadcb12e1d3ac91ed05d1bc525c4148e90b5f921a185f8853b4aa8371557b8423612365c9f2c4838058193fd398992387f592
-
Filesize
3.3MB
MD580ccf487954ed870afbfc1a4e06bf598
SHA14eba80cc72a33d6e6e44656f5d71f88e66c6b8eb
SHA256f20da98d54ef8e20a1478fce388040b106cee2c6dd804eb6910811b73541cdbd
SHA51211f714bc933241e084258172716eadcb12e1d3ac91ed05d1bc525c4148e90b5f921a185f8853b4aa8371557b8423612365c9f2c4838058193fd398992387f592
-
Filesize
3.3MB
MD580ccf487954ed870afbfc1a4e06bf598
SHA14eba80cc72a33d6e6e44656f5d71f88e66c6b8eb
SHA256f20da98d54ef8e20a1478fce388040b106cee2c6dd804eb6910811b73541cdbd
SHA51211f714bc933241e084258172716eadcb12e1d3ac91ed05d1bc525c4148e90b5f921a185f8853b4aa8371557b8423612365c9f2c4838058193fd398992387f592
-
Filesize
3.3MB
MD54c36268c23fef72fc16e8712fdda2791
SHA1912b0fb9e17c64a2501871f209db1666a9607a54
SHA25695b84571674b6203c07c60a570bbc136d6da8a401ad1715e14569c57b9241353
SHA512b2a122ea42c3d4312f1f5951aa11ee8b565e048f603b42a0351a0e4e911316e9e3e2ecd6e2276747182ad602e4522d9228e455825401997321fff706f0140d1a
-
Filesize
3.3MB
MD5eaee6044de9fa0562e1295675c4bd57a
SHA15a340f295c1f50ad4ff3d3ea107237b339cd28b5
SHA256183dd1586d136156daf6190b31379f487dbb3ceb9d3f9eb32a5bf6f3252a56ef
SHA5125778c7837719c5df6759b75f7de77c885a1dc29f6e4789a275320408245599cb057a941d78d03b6dadfc32e1a27b49c6434fd97c7fc831b0d404173e7abc82f8
-
Filesize
168B
MD5bb0b4314044f6e3d3d8dfef792dbcc44
SHA17203591c4bd81fc772643c538e4f740b63b00382
SHA2568cc21de30407fede79b71d11f59ff0f1fe61c9d1f6e959e69eae6b5dd712c306
SHA5125b399e305fe06f00e036a002504a6e1d8cfd22ca3ffa0f9ea737c068e4ca9e54ba873e1e440729a602af142a3be801f40521d663cec71b85aaec970005b12f0b
-
Filesize
200B
MD54cc9ca4fe2f0c4553d64d38cd83d1b33
SHA1dbbec372e835da5e8b16950db52888a29bc72411
SHA25652ff4e4fd03bbe3548de55d603d3c37cb96f3a40fb1daa25c54d2c0349250296
SHA5129b6e5fb9d7d58de5d7c55d0e2460d56d39726d7e542603e39ed9e91f377653a8a44fd8c30675e426578db02be9c3ab0d3bdee00b2850fcdd6f5e97cd6e6e957e
-
Filesize
3.3MB
MD5edd88bee04628c75fb9ffe8293576e08
SHA167f2c469c4b81ded9efde0e1dd70b35b9136a003
SHA2565eb7d59d0acc25f02bfff5f085ba5298583ed39bac41257ddc6c7aa70a876b3a
SHA51215777ac1c50952e084b71283a345c24ad2c4e2ca485bff821a8a643c507d50f3b6eabf6ce8f7ddc60d3c82c0cdbe951efc7b37311585045008c3151404f37815
-
Filesize
3.3MB
MD5edd88bee04628c75fb9ffe8293576e08
SHA167f2c469c4b81ded9efde0e1dd70b35b9136a003
SHA2565eb7d59d0acc25f02bfff5f085ba5298583ed39bac41257ddc6c7aa70a876b3a
SHA51215777ac1c50952e084b71283a345c24ad2c4e2ca485bff821a8a643c507d50f3b6eabf6ce8f7ddc60d3c82c0cdbe951efc7b37311585045008c3151404f37815
-
Filesize
3.3MB
MD5edd88bee04628c75fb9ffe8293576e08
SHA167f2c469c4b81ded9efde0e1dd70b35b9136a003
SHA2565eb7d59d0acc25f02bfff5f085ba5298583ed39bac41257ddc6c7aa70a876b3a
SHA51215777ac1c50952e084b71283a345c24ad2c4e2ca485bff821a8a643c507d50f3b6eabf6ce8f7ddc60d3c82c0cdbe951efc7b37311585045008c3151404f37815
-
Filesize
3.3MB
MD580ccf487954ed870afbfc1a4e06bf598
SHA14eba80cc72a33d6e6e44656f5d71f88e66c6b8eb
SHA256f20da98d54ef8e20a1478fce388040b106cee2c6dd804eb6910811b73541cdbd
SHA51211f714bc933241e084258172716eadcb12e1d3ac91ed05d1bc525c4148e90b5f921a185f8853b4aa8371557b8423612365c9f2c4838058193fd398992387f592
-
Filesize
3.3MB
MD5edd88bee04628c75fb9ffe8293576e08
SHA167f2c469c4b81ded9efde0e1dd70b35b9136a003
SHA2565eb7d59d0acc25f02bfff5f085ba5298583ed39bac41257ddc6c7aa70a876b3a
SHA51215777ac1c50952e084b71283a345c24ad2c4e2ca485bff821a8a643c507d50f3b6eabf6ce8f7ddc60d3c82c0cdbe951efc7b37311585045008c3151404f37815