Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
8e39ddc4dcea638cc3ce10c7c9e4666b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e39ddc4dcea638cc3ce10c7c9e4666b.exe
Resource
win10v2004-20231215-en
General
-
Target
8e39ddc4dcea638cc3ce10c7c9e4666b.exe
-
Size
227KB
-
MD5
8e39ddc4dcea638cc3ce10c7c9e4666b
-
SHA1
06a532c9059b15466e0e0de7a2f78a101d3bee00
-
SHA256
8fdbf538b7650efb41fb65269578af86c679cc0577399057f7385931c77075fb
-
SHA512
dcac3b07b076cccf3a3b998376038683d64939116e3d99539a8a6870a235cd40d8e0a611febac82481975cd7f599827fbe3476c2ce94db867c13a241927b91eb
-
SSDEEP
3072:Rr8WDrC8PkADIRnrxSuyJ1gjuYUEHjE2YKHMq8gus0ccntpQQDO+41YmbQy4tpQ2:tuDcIRouWgi0LDZoQ1VY7y+Q1VY7yw
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
pid Process 2352 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Loads dropped DLL 3 IoCs
pid Process 2380 8e39ddc4dcea638cc3ce10c7c9e4666b.exe 2380 8e39ddc4dcea638cc3ce10c7c9e4666b.exe 2380 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2352 2380 8e39ddc4dcea638cc3ce10c7c9e4666b.exe 28 PID 2380 wrote to memory of 2352 2380 8e39ddc4dcea638cc3ce10c7c9e4666b.exe 28 PID 2380 wrote to memory of 2352 2380 8e39ddc4dcea638cc3ce10c7c9e4666b.exe 28 PID 2380 wrote to memory of 2352 2380 8e39ddc4dcea638cc3ce10c7c9e4666b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"C:\Users\Admin\AppData\Local\Temp\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"2⤵
- Executes dropped EXE
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
859KB
MD5beb6dae71186da2adfa2e5671bcfd154
SHA12c520dfe3490772dfc6bbc2783c5114ca303d39d
SHA256832b42331ca55ce423a4556827cfacdca82c6dbef771619a28b965ef5c62b815
SHA512002423a98f74c7f1244fa9caa06e82cecec67d6bf2c721c7cfb7deaf5995e5ba89ff0ce19c9f5294f0fea608753afdac0c324f194e76c0cac4b835de38fcd09e
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
187KB
MD54bb925a6cb23abe798c26d97df059912
SHA1cab0aef795bb41eab5f7efdc7a02ec76582ddb0b
SHA2561fb3441c3f3d7cdd590687b1545fc0582e143d357e8cfa10f269fa223554a93f
SHA5120a306752a33c52272ed5de94ec2c272989c1633c5886862bdb6605a47ed09ef2c3ba17c7da6ecd6dbf0c46f0af33cc3b334e4b0dbba1b1ed4c329ab6269247a9