Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
7c2d61be6904c8c0373e55adac7175c0_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c2d61be6904c8c0373e55adac7175c0_NEAS.exe
Resource
win10v2004-20240226-en
General
-
Target
7c2d61be6904c8c0373e55adac7175c0_NEAS.exe
-
Size
225KB
-
MD5
7c2d61be6904c8c0373e55adac7175c0
-
SHA1
3a004eba5b415bd1667524555a2b93d31c94b5f2
-
SHA256
8d472a1c702b54a5cf4fd917eb3c96ea27c708704773d8361697deb28122f253
-
SHA512
d33b9357ce9b0bbafe2785c5306a9949371acc36a097be70585b6142f4f73dcb87b26d219773e1622bd6eaed7413b558a6fc94c4f04dcb954c2a19871b3f96aa
-
SSDEEP
6144:sA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:sATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\71520524 = "C:\\Users\\Admin\\AppData\\Roaming\\71520524\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe 1592 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1592 winver.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2772 wrote to memory of 1592 2772 7c2d61be6904c8c0373e55adac7175c0_NEAS.exe 102 PID 2772 wrote to memory of 1592 2772 7c2d61be6904c8c0373e55adac7175c0_NEAS.exe 102 PID 2772 wrote to memory of 1592 2772 7c2d61be6904c8c0373e55adac7175c0_NEAS.exe 102 PID 2772 wrote to memory of 1592 2772 7c2d61be6904c8c0373e55adac7175c0_NEAS.exe 102 PID 1592 wrote to memory of 3300 1592 winver.exe 55 PID 1592 wrote to memory of 2396 1592 winver.exe 41 PID 1592 wrote to memory of 2404 1592 winver.exe 42 PID 1592 wrote to memory of 2508 1592 winver.exe 44 PID 1592 wrote to memory of 3300 1592 winver.exe 55 PID 1592 wrote to memory of 3696 1592 winver.exe 57 PID 1592 wrote to memory of 3892 1592 winver.exe 58 PID 1592 wrote to memory of 4036 1592 winver.exe 59 PID 1592 wrote to memory of 1076 1592 winver.exe 60 PID 1592 wrote to memory of 3416 1592 winver.exe 61 PID 1592 wrote to memory of 4164 1592 winver.exe 62 PID 1592 wrote to memory of 4648 1592 winver.exe 64 PID 1592 wrote to memory of 4708 1592 winver.exe 74 PID 1592 wrote to memory of 684 1592 winver.exe 77 PID 1592 wrote to memory of 2496 1592 winver.exe 78 PID 1592 wrote to memory of 2280 1592 winver.exe 79 PID 1592 wrote to memory of 408 1592 winver.exe 80 PID 1592 wrote to memory of 3436 1592 winver.exe 81 PID 1592 wrote to memory of 2524 1592 winver.exe 83 PID 1592 wrote to memory of 4288 1592 winver.exe 84 PID 1592 wrote to memory of 2772 1592 winver.exe 90
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2396
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2404
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2508
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\7c2d61be6904c8c0373e55adac7175c0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\7c2d61be6904c8c0373e55adac7175c0_NEAS.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1592
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3696
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3892
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4036
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1076
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3416
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4164
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4648
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f4,0x7ffd3b3c2e98,0x7ffd3b3c2ea4,0x7ffd3b3c2eb02⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2276 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:22⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3220 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:32⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3480 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5312 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5324 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3908 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:82⤵PID:1796
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:1164