Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 05:00
Behavioral task
behavioral1
Sample
0f6181ddbcd053e6b7f391abbcdc27c5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f6181ddbcd053e6b7f391abbcdc27c5.exe
Resource
win10v2004-20231215-en
General
-
Target
0f6181ddbcd053e6b7f391abbcdc27c5.exe
-
Size
233KB
-
MD5
0f6181ddbcd053e6b7f391abbcdc27c5
-
SHA1
5aae26bc5792ff2015251552c5fbf0a77dce1dca
-
SHA256
3c33d10e5a6aaa86c69f0740de2ac08bb92aa3d715454b94438d217098bb1ad1
-
SHA512
a0d935ffc87eb5d4a708995d11c9cb141c8783a9e619479e991d67182326694e065f364d62584e8c51a459c52756bda44c874297d6203cc54ac8f851c91818da
-
SSDEEP
3072:sr85C1d96HM0XU+aDe5UEjmIlmijI7rUGimM+M4MCimr4O7OAGBuHvsesf3nW:k9bn+aC1meyUGimM+wCimFOAzA3W
Malware Config
Signatures
-
Detect Neshta payload 1 IoCs
resource yara_rule behavioral1/memory/2248-94-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
pid Process 2460 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Loads dropped DLL 2 IoCs
pid Process 2248 0f6181ddbcd053e6b7f391abbcdc27c5.exe 2248 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0f6181ddbcd053e6b7f391abbcdc27c5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2460 2248 0f6181ddbcd053e6b7f391abbcdc27c5.exe 17 PID 2248 wrote to memory of 2460 2248 0f6181ddbcd053e6b7f391abbcdc27c5.exe 17 PID 2248 wrote to memory of 2460 2248 0f6181ddbcd053e6b7f391abbcdc27c5.exe 17 PID 2248 wrote to memory of 2460 2248 0f6181ddbcd053e6b7f391abbcdc27c5.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f6181ddbcd053e6b7f391abbcdc27c5.exe"C:\Users\Admin\AppData\Local\Temp\0f6181ddbcd053e6b7f391abbcdc27c5.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0f6181ddbcd053e6b7f391abbcdc27c5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\0f6181ddbcd053e6b7f391abbcdc27c5.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2460
-