Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
8e39ddc4dcea638cc3ce10c7c9e4666b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e39ddc4dcea638cc3ce10c7c9e4666b.exe
Resource
win10v2004-20231215-en
General
-
Target
8e39ddc4dcea638cc3ce10c7c9e4666b.exe
-
Size
227KB
-
MD5
8e39ddc4dcea638cc3ce10c7c9e4666b
-
SHA1
06a532c9059b15466e0e0de7a2f78a101d3bee00
-
SHA256
8fdbf538b7650efb41fb65269578af86c679cc0577399057f7385931c77075fb
-
SHA512
dcac3b07b076cccf3a3b998376038683d64939116e3d99539a8a6870a235cd40d8e0a611febac82481975cd7f599827fbe3476c2ce94db867c13a241927b91eb
-
SSDEEP
3072:Rr8WDrC8PkADIRnrxSuyJ1gjuYUEHjE2YKHMq8gus0ccntpQQDO+41YmbQy4tpQ2:tuDcIRouWgi0LDZoQ1VY7y+Q1VY7yw
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Executes dropped EXE 1 IoCs
pid Process 1624 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{17316~1\WINDOW~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13181~1.5\MICROS~2.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13181~1.5\MIA062~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13181~1.5\MI9C33~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13181~1.5\MICROS~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{FB050~1\WINDOW~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 8e39ddc4dcea638cc3ce10c7c9e4666b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3348 wrote to memory of 1624 3348 8e39ddc4dcea638cc3ce10c7c9e4666b.exe 86 PID 3348 wrote to memory of 1624 3348 8e39ddc4dcea638cc3ce10c7c9e4666b.exe 86 PID 3348 wrote to memory of 1624 3348 8e39ddc4dcea638cc3ce10c7c9e4666b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"C:\Users\Admin\AppData\Local\Temp\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\8e39ddc4dcea638cc3ce10c7c9e4666b.exe"2⤵
- Executes dropped EXE
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5dfd01e298b2f6aee74d571c8247e8856
SHA1ad136e9f09e915ebd37e1a82b621fbe492a122ef
SHA2565eb2105996e0f529c5f931a805d47a4f8d612746ac1778240a17193c44eb4e1f
SHA512d01854e1f07c4974d08f488497ba1f0c816d2d645cdc6f79d6f5a6f46994d92b13e7f46fee506314831d96ad926a9f8b5009acbf772181105ac68f3f4fbb638c
-
Filesize
187KB
MD54bb925a6cb23abe798c26d97df059912
SHA1cab0aef795bb41eab5f7efdc7a02ec76582ddb0b
SHA2561fb3441c3f3d7cdd590687b1545fc0582e143d357e8cfa10f269fa223554a93f
SHA5120a306752a33c52272ed5de94ec2c272989c1633c5886862bdb6605a47ed09ef2c3ba17c7da6ecd6dbf0c46f0af33cc3b334e4b0dbba1b1ed4c329ab6269247a9