Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
00dfc408880007275933567dc343ab0d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
00dfc408880007275933567dc343ab0d.exe
Resource
win10v2004-20231215-en
General
-
Target
00dfc408880007275933567dc343ab0d.exe
-
Size
120KB
-
MD5
00dfc408880007275933567dc343ab0d
-
SHA1
f8a23cdc8043c19cd3971df468154459684def59
-
SHA256
37aca0e15afb37c747d8ad9da34e53bf5e028e2c719cb66da79131114a44fd12
-
SHA512
e99c4d0d30f4a9609967aefd718fba1190f3cc49464d2ece93e7632a8ac35e71d85a1270d1c6924e06d565f8faf38931ef132ad65dc88d91d928c9a56e08101e
-
SSDEEP
1536:6TvMEQettA+M0KuPe+cq2+VbM5dtO2XhXTOkIHzEHPjzVddnSlv3Q:6bDA+Mp+P2Rs2R0HgHPjztS+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 00dfc408880007275933567dc343ab0d.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" neyet.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 00dfc408880007275933567dc343ab0d.exe -
Executes dropped EXE 1 IoCs
pid Process 2148 neyet.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /w" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /P" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /B" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /V" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /p" 00dfc408880007275933567dc343ab0d.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /x" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /O" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /q" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /l" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /H" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /a" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /G" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /S" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /f" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /y" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /t" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /d" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /u" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /A" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /L" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /p" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /k" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /m" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /J" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /v" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /X" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /T" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /c" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /K" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /Q" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /W" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /I" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /U" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /h" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /F" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /z" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /C" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /Y" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /E" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /n" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /M" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /i" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /j" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /s" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /D" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /N" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /Z" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /o" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /g" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /e" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /r" neyet.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neyet = "C:\\Users\\Admin\\neyet.exe /R" neyet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 00dfc408880007275933567dc343ab0d.exe 4864 00dfc408880007275933567dc343ab0d.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe 2148 neyet.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4864 00dfc408880007275933567dc343ab0d.exe 2148 neyet.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2148 4864 00dfc408880007275933567dc343ab0d.exe 91 PID 4864 wrote to memory of 2148 4864 00dfc408880007275933567dc343ab0d.exe 91 PID 4864 wrote to memory of 2148 4864 00dfc408880007275933567dc343ab0d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\00dfc408880007275933567dc343ab0d.exe"C:\Users\Admin\AppData\Local\Temp\00dfc408880007275933567dc343ab0d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\neyet.exe"C:\Users\Admin\neyet.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD53d620eb704a197bbc68a46ebca152748
SHA1bbc5ffba22e32b2b8f79c5a3602ae12224d86327
SHA256de007589b2d16b277a22ecd64f3da76c5c4f8caf1d96bb531f321ae6b8447b5e
SHA512aa6c744f40d6dc2e3bc0f7c6dee1e2326c5409b4312a33c1ca6c9809f84e8a907ed802ff0a6101bb7ffb2e6d0b00dfff8c69fbf9ad5f77875f9a4969350505bd