Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe
Resource
win7-20231023-en
General
-
Target
NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe
-
Size
342KB
-
MD5
07ea9abe8aeda1c72f42967c7d9f475a
-
SHA1
5f495b957acc693e5019ee2ccb5a1f458286f67f
-
SHA256
a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a
-
SHA512
8cbdfc199506f980e282b93691bcf97b09d1d0617e9a533785a67f54e2ed267e0a957181deea3d958b46c48058531004a99456790cb1f24ba7455e9186fa2e53
-
SSDEEP
6144:wBlL/90OO8k3NWzK22YTzxAdhlpOxWe+mJ/0u4p6+zTV28BkvTXR:C/0Oe3NWh2dhoWG/0u4s+fyXR
Malware Config
Extracted
formbook
4.1
fs35
latechdz.com
sdp-ploce.com
ss203.site
sm6yuy.net
needstothink.com
heginstwp.com
blueplumespirit.com
vemconferirshop.click
yorent-auto.com
eleononaly.com
medicalspacelocators.com
7law.info
imacanberra.online
bbtyss.top
onlyanfans.com
varenty.com
fappies.shop
313865.com
hongpools.com
babkacuisine.xyz
usofty.com
jdjnxsu.com
teammonitoringservices.com
retortprocessinglab.com
rooferstakeoff.com
hansonelecs.com
em4ai.com
urbiznet.com
merchantgeniussaiyanflame.com
elegance-x-agency.com
cheekyfancy.com
ciaraile-hair.store
exactix.online
essentiallymotherearth.com
thebrollybuddy.com
associacaoacademicaguarda.com
manjort.xyz
mylifestylelounge.com
ser25kgr.monster
abbiejhooper.xyz
mjp77.com
dompompomdompom.shop
sugikougei.com
tacosantojrz.com
7yyhdjwwqq.com
vri4d.com
53b9fd8cfbfb.info
xlookcoins.top
uncongneniality.shop
coats-34172.bond
amazingpawpalace.com
actionkillsfear.com
supportlakecentral.com
xn--9kq7ik28o.club
lasermywords.com
t5-1682468.xyz
eastonelitesoftball.com
bagpackgalaxy.com
petlove6.com
fryconnect.online
autolusaccess.com
planetbravos.com
80smaoi.top
iit.world
i-ooedo.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/208-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/208-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/216-21-0x00000000008A0000-0x00000000008CF000-memory.dmp formbook behavioral2/memory/216-23-0x00000000008A0000-0x00000000008CF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 4728 lqhpvxmtbn.exe 208 lqhpvxmtbn.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4728 set thread context of 208 4728 lqhpvxmtbn.exe 90 PID 208 set thread context of 3120 208 lqhpvxmtbn.exe 42 PID 216 set thread context of 3120 216 msiexec.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 208 lqhpvxmtbn.exe 208 lqhpvxmtbn.exe 208 lqhpvxmtbn.exe 208 lqhpvxmtbn.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe 216 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3120 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4728 lqhpvxmtbn.exe 208 lqhpvxmtbn.exe 208 lqhpvxmtbn.exe 208 lqhpvxmtbn.exe 216 msiexec.exe 216 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 208 lqhpvxmtbn.exe Token: SeDebugPrivilege 216 msiexec.exe Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeManageVolumePrivilege 2100 svchost.exe Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3120 Explorer.EXE 3120 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3120 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2448 wrote to memory of 4728 2448 NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe 88 PID 2448 wrote to memory of 4728 2448 NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe 88 PID 2448 wrote to memory of 4728 2448 NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe 88 PID 4728 wrote to memory of 208 4728 lqhpvxmtbn.exe 90 PID 4728 wrote to memory of 208 4728 lqhpvxmtbn.exe 90 PID 4728 wrote to memory of 208 4728 lqhpvxmtbn.exe 90 PID 4728 wrote to memory of 208 4728 lqhpvxmtbn.exe 90 PID 3120 wrote to memory of 216 3120 Explorer.EXE 93 PID 3120 wrote to memory of 216 3120 Explorer.EXE 93 PID 3120 wrote to memory of 216 3120 Explorer.EXE 93 PID 216 wrote to memory of 4596 216 msiexec.exe 99 PID 216 wrote to memory of 4596 216 msiexec.exe 99 PID 216 wrote to memory of 4596 216 msiexec.exe 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2056
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3692
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\lqhpvxmtbn.exe"3⤵PID:4596
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5036699749dbc4d9ee16693d97e885cbc
SHA1857a9a87bb7057733922c8e64dce6b656e41a611
SHA2562e79408d5870d56d7d14856ea7008920388e91f5493ebb8aaa0dd0a1958cfdf7
SHA512c23aa658b4327d5fbb10d9f4dc8fba4c6570550c12a693dcde70addf508906040e5d8f8a4077a4e0bf15b6fd3e386066ad8bb73a9252220790009b1ca00311a8
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d
-
Filesize
259KB
MD559d3466cb62ce44599445f169be90a8b
SHA1fbc781048b2a66f62534cbf4b34a3574f4b17509
SHA2560db8d28e0ef57e82a3dfe1b19a95ae245e53a72f43546f01d19e074055018c3a
SHA512a3682fece2fd39865d64094ab1b831ab132ca088ac03954a09e71f4b2e1f1f003281b2d2e7b5c1f82009d778bbe56de180f0599dae71ae0774bbae5d2b19cd0d
-
Filesize
205KB
MD5239f1ff96b0e979869e96c0b16b96196
SHA1870933b2120c8a592648524a56d8b3a81871b0fa
SHA256f60e2fb571c7a63cfe803c04c96afa011f04ff0767d78f1f10694ad96d017ea7
SHA5127e03d69fb7b1138c4226313249536b3ddb13374dae458b76c805919d03137dcd1c74fbfa1fad925c0e1dabaa9bf267701b6033485b9ed0620b2d7958bf8584f7