Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
necurs.exe
Resource
win7-20240708-en
General
-
Target
necurs.exe
-
Size
1008KB
-
MD5
6e05e84c7a993880409d7a0324c10e74
-
SHA1
4cac8146d54c5e47ec1c31a04c3cafdec9fbf209
-
SHA256
ffb1150bbb28d53f325b00445be935cd657c1d8061ba73e91af5b343b6c0d438
-
SHA512
4a4fa48ce31abea8cab4ca176f9d5be4b1b9b9c45c574f2e3605eaf04fd2fbd3da37d464300b2954623b0b9d377cff0a47d082b7fc1cc82a6d3eeab87555d43a
-
SSDEEP
24576:XiB1Q0SPpqqUGB9Qe5k04Q9RGuRUEy3FKEdeybpk/w:XJ/PMq3B9Qet1pyVbNbGo
Malware Config
Extracted
dridex
0.79.198.234:6811
59.14.232.108:13510
153.85.116.88:34145
109.165.79.26:57028
3.48.31.250:32970
198.99.233.8:64668
4.144.183.219:57415
170.9.63.116:12621
82.190.146.50:8956
110.106.233.26:61144
231.170.120.138:36240
104.89.112.76:49715
14.217.137.57:20854
108.38.229.252:62814
53.121.3.237:39876
97.219.18.138:20575
120.178.203.178:46408
220.127.249.215:18420
172.217.87.204:28067
175.53.142.26:45560
79.177.200.36:30665
157.53.112.14:24571
153.64.214.166:12471
194.48.95.77:18925
214.85.249.68:28066
93.79.182.194:29244
163.13.32.46:46047
212.205.92.244:21860
78.97.217.240:615
27.202.220.101:53936
252.185.46.233:2507
77.1.238.136:37717
193.168.14.54:56242
105.57.199.109:43871
200.238.177.51:3233
85.228.35.145:11145
59.131.81.227:54421
15.222.176.191:6899
9.206.11.51:18566
232.151.55.193:27910
39.208.106.42:4425
169.226.218.62:61091
180.83.120.180:7070
54.176.49.3:647
75.118.155.164:7951
104.171.164.255:43691
109.160.209.120:49272
252.155.180.35:47395
163.11.41.2:47224
244.234.153.216:39994
56.244.68.190:27859
166.237.100.149:43076
86.94.58.103:48991
152.74.37.2:25716
151.80.170.213:57489
107.89.39.94:16844
163.136.199.107:31768
125.209.93.158:53991
97.41.143.176:8565
221.48.11.129:23678
8.13.230.253:18487
235.112.166.200:64292
151.59.48.34:19843
198.172.0.182:37881
185.163.199.76:45269
208.48.251.238:56606
129.164.223.85:59804
127.209.188.0:6400
144.15.158.66:43476
38.156.205.253:33
185.0.0.0:0
Signatures
-
resource yara_rule behavioral2/memory/4280-1-0x0000000001DE0000-0x0000000001EDC000-memory.dmp dridex_ldr behavioral2/memory/4280-4-0x0000000001DE0000-0x0000000001EDC000-memory.dmp dridex_ldr behavioral2/memory/4432-72-0x0000000001DE0000-0x0000000001EDC000-memory.dmp dridex_ldr behavioral2/memory/2708-78-0x0000000001DE0000-0x0000000001EDC000-memory.dmp dridex_ldr -
Executes dropped EXE 2 IoCs
pid Process 1268 CameraSettingsUIHost.exe 2780 unregmp2.exe -
Loads dropped DLL 2 IoCs
pid Process 1268 CameraSettingsUIHost.exe 2780 unregmp2.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA necurs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA necurs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA necurs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA necurs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CameraSettingsUIHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Process not Found Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4260 schtasks.exe 4272 schtasks.exe 2260 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4280 necurs.exe 4280 necurs.exe 4432 necurs.exe 4432 necurs.exe 2708 necurs.exe 2708 necurs.exe 4496 necurs.exe 4496 necurs.exe 1268 CameraSettingsUIHost.exe 1268 CameraSettingsUIHost.exe 1268 CameraSettingsUIHost.exe 1268 CameraSettingsUIHost.exe 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 2780 unregmp2.exe 2780 unregmp2.exe 2780 unregmp2.exe 2780 unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4280 necurs.exe Token: SeTcbPrivilege 4280 necurs.exe Token: SeDebugPrivilege 4432 necurs.exe Token: SeTcbPrivilege 4432 necurs.exe Token: SeDebugPrivilege 2708 necurs.exe Token: SeTcbPrivilege 2708 necurs.exe Token: SeDebugPrivilege 4496 necurs.exe Token: SeTcbPrivilege 4496 necurs.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4280 wrote to memory of 704 4280 necurs.exe 96 PID 4280 wrote to memory of 704 4280 necurs.exe 96 PID 4280 wrote to memory of 2100 4280 necurs.exe 97 PID 4280 wrote to memory of 2100 4280 necurs.exe 97 PID 4280 wrote to memory of 2704 4280 necurs.exe 98 PID 4280 wrote to memory of 2704 4280 necurs.exe 98 PID 4280 wrote to memory of 3128 4280 necurs.exe 99 PID 4280 wrote to memory of 3128 4280 necurs.exe 99 PID 4280 wrote to memory of 2260 4280 necurs.exe 100 PID 4280 wrote to memory of 2260 4280 necurs.exe 100 PID 4280 wrote to memory of 2260 4280 necurs.exe 100 PID 4280 wrote to memory of 4932 4280 necurs.exe 102 PID 4280 wrote to memory of 4932 4280 necurs.exe 102 PID 4280 wrote to memory of 4932 4280 necurs.exe 102 PID 4496 wrote to memory of 2588 4496 necurs.exe 105 PID 4496 wrote to memory of 2588 4496 necurs.exe 105 PID 4496 wrote to memory of 3736 4496 necurs.exe 106 PID 4496 wrote to memory of 3736 4496 necurs.exe 106 PID 4496 wrote to memory of 4412 4496 necurs.exe 107 PID 4496 wrote to memory of 4412 4496 necurs.exe 107 PID 4496 wrote to memory of 1612 4496 necurs.exe 108 PID 4496 wrote to memory of 1612 4496 necurs.exe 108 PID 4496 wrote to memory of 2520 4496 necurs.exe 109 PID 4496 wrote to memory of 2520 4496 necurs.exe 109 PID 4496 wrote to memory of 3212 4496 necurs.exe 110 PID 4496 wrote to memory of 3212 4496 necurs.exe 110 PID 4496 wrote to memory of 2892 4496 necurs.exe 111 PID 4496 wrote to memory of 2892 4496 necurs.exe 111 PID 4496 wrote to memory of 4260 4496 necurs.exe 112 PID 4496 wrote to memory of 4260 4496 necurs.exe 112 PID 4496 wrote to memory of 4260 4496 necurs.exe 112 PID 4496 wrote to memory of 4204 4496 necurs.exe 114 PID 4496 wrote to memory of 4204 4496 necurs.exe 114 PID 4496 wrote to memory of 4204 4496 necurs.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\necurs.exe"C:\Users\Admin\AppData\Local\Temp\necurs.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\system32\browserexport.exeC:\Windows\system32\browserexport.exe2⤵PID:704
-
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe2⤵PID:2100
-
-
C:\Windows\system32\calc.exeC:\Windows\system32\calc.exe2⤵PID:2704
-
-
C:\Windows\system32\CameraSettingsUIHost.exeC:\Windows\system32\CameraSettingsUIHost.exe2⤵PID:3128
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /create /F /TN "Ljlkwqtqf" /TR "C:\Users\Admin\AppData\Roaming\1XLo8y\CameraSettingsUIHost.exe" /RU Admin /SC minute /MO 602⤵
- Scheduled Task/Job: Scheduled Task
PID:2260
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /run /TN "Ljlkwqtqf"2⤵PID:4932
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\necurs.exe"C:\Users\Admin\AppData\Local\Temp\necurs.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:2636
-
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe2⤵PID:1280
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /create /F /TN "Ljlkwqtqf" /TR "C:\Users\Admin\AppData\Roaming\g9R6\sessionmsg.exe" /RU Admin /SC minute /MO 602⤵
- Scheduled Task/Job: Scheduled Task
PID:4272
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /run /TN "Ljlkwqtqf"2⤵PID:184
-
-
C:\Users\Admin\AppData\Local\Temp\necurs.exe"C:\Users\Admin\AppData\Local\Temp\necurs.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
C:\Users\Admin\AppData\Local\Temp\necurs.exe"C:\Users\Admin\AppData\Local\Temp\necurs.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\system32\TokenBrokerCookies.exeC:\Windows\system32\TokenBrokerCookies.exe2⤵PID:2588
-
-
C:\Windows\system32\tpmvscmgrsvr.exeC:\Windows\system32\tpmvscmgrsvr.exe2⤵PID:3736
-
-
C:\Windows\system32\TSTheme.exeC:\Windows\system32\TSTheme.exe2⤵PID:4412
-
-
C:\Windows\system32\TSWbPrxy.exeC:\Windows\system32\TSWbPrxy.exe2⤵PID:1612
-
-
C:\Windows\system32\ucsvc.exeC:\Windows\system32\ucsvc.exe2⤵PID:2520
-
-
C:\Windows\system32\UIMgrBroker.exeC:\Windows\system32\UIMgrBroker.exe2⤵PID:3212
-
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe2⤵PID:2892
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /create /F /TN "Ljlkwqtqf" /TR "C:\Users\Admin\AppData\Roaming\aXIx\unregmp2.exe" /RU Admin /SC minute /MO 602⤵
- Scheduled Task/Job: Scheduled Task
PID:4260
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /run /TN "Ljlkwqtqf"2⤵PID:4204
-
-
C:\Users\Admin\AppData\Roaming\1XLo8y\CameraSettingsUIHost.exeC:\Users\Admin\AppData\Roaming\1XLo8y\CameraSettingsUIHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1268
-
C:\Users\Admin\AppData\Roaming\aXIx\unregmp2.exeC:\Users\Admin\AppData\Roaming\aXIx\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
C:\Users\Admin\AppData\Roaming\g9R6\sessionmsg.exeC:\Users\Admin\AppData\Roaming\g9R6\sessionmsg.exe1⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD59e98636523a653c7a648f37be229cf69
SHA1bd4da030e7cf4d55b7c644dfacd26b152e6a14c4
SHA2563bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717
SHA51241966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78
-
Filesize
972KB
MD52cb92fedd3d1c1159d4690016f095681
SHA157823745e4f2a17553cb7acf7d11b90870ca36f1
SHA256458968e3795b832e977c9adfa2a18b4c784380a19ed92439fd41ff9af04d437b
SHA512820475d44d983a3b7db72f1285180f4c51e54c1b4755d04eeedc82164261a570d963696b43b05e09a52da118b97822408f79bd48980db07f9581e02cbc079c3b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3642458265-1901903390-453309326-1000\0f5007522459c86e95ffcc62f32308f1_5bcbec04-14ea-4af4-ad61-da8ce2826342
Filesize1KB
MD5950ebe96859f7ad2194cce45ba32bede
SHA1ec77126b84fba5f858a84cde4373e1724c86d481
SHA2561db92b26f408ddb6f3ac47574cd49cf4dc131efa8090477bf6d0a5feea4bdf1c
SHA5124755508c6a9fb44d196c2fb4de3cd229b5526f48e1baf0057db858930d5e940c0e7c2c62cfc1e66e558987f2e93d11abeded72c709020df80c0b773607c33d8b
-
Filesize
692KB
MD5578e0d415a769435a4e11c25b224e852
SHA1ef09b8b865fa3cfe1bb324abb283c50d326bb3eb
SHA256f4c44e7c8989d453cf33f595fc31c94217326933757084872b004f1085c8c593
SHA512c0d513543498f6549b2efe78c83bc5f982b989f3d2caa92e9e2866d3b4c150b5e2bb94a510ca1412f8cacc6e5cd86784d1bd4aafab54a74a9306cd0fccad8247
-
Filesize
259KB
MD5a6fc8ce566dec7c5873cb9d02d7b874e
SHA1a30040967f75df85a1e3927bdce159b102011a61
SHA25621f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d
SHA512f83e17dd305eb1bc24cca1f197e2440f9b501eafb9c9d44ede7c88b1520030a87d059bdcb8eadeac1eaedabcbc4fe50206821965d73f0f6671e27edd55c01cbc
-
Filesize
700KB
MD5c320690c016d5d7898fed331c3c1882e
SHA1997a27e93e141822146aee06adf8656c30e3d31f
SHA2565b2b9dc6cd47941df95f9ad403042859ee05311f38c561827568d0cfc8c1d76d
SHA512aa9fad891320857509c45d6793d7e34905f3694f9e35e8df95fe01cc112a5d5b427ba679a84aeb9d823ada999cca550736337637fcf669d14c6aeb6c8f773a91
-
Filesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db