Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
6a81c46a52523e78bfd1615e1c723f30N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6a81c46a52523e78bfd1615e1c723f30N.exe
Resource
win10v2004-20240802-en
General
-
Target
6a81c46a52523e78bfd1615e1c723f30N.exe
-
Size
146KB
-
MD5
6a81c46a52523e78bfd1615e1c723f30
-
SHA1
b1276556f6873ba29e02206d3dfe3257fea852fe
-
SHA256
7857216819f2655574dfbef7833b68b70dd2ff60fe4d1326d374590e9395e50a
-
SHA512
d7df7857f46935bfd0549bada703147ca518e9538b8e89b019365fca72edbc232acbd2e43a1ca7914a03df9b2978a0875cf816c0c9e7d6b15af42c0945aa4d6f
-
SSDEEP
3072:zr8WDrCykbAYn2GgYlBYN2fHYTo+krt8wDSRUTT:PuTbAMpgY3gTC8DRUTT
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
pid Process 2560 6a81c46a52523e78bfd1615e1c723f30N.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 6a81c46a52523e78bfd1615e1c723f30N.exe 2564 6a81c46a52523e78bfd1615e1c723f30N.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 6a81c46a52523e78bfd1615e1c723f30N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 6a81c46a52523e78bfd1615e1c723f30N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 6a81c46a52523e78bfd1615e1c723f30N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 6a81c46a52523e78bfd1615e1c723f30N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a81c46a52523e78bfd1615e1c723f30N.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 6a81c46a52523e78bfd1615e1c723f30N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2560 2564 6a81c46a52523e78bfd1615e1c723f30N.exe 31 PID 2564 wrote to memory of 2560 2564 6a81c46a52523e78bfd1615e1c723f30N.exe 31 PID 2564 wrote to memory of 2560 2564 6a81c46a52523e78bfd1615e1c723f30N.exe 31 PID 2564 wrote to memory of 2560 2564 6a81c46a52523e78bfd1615e1c723f30N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a81c46a52523e78bfd1615e1c723f30N.exe"C:\Users\Admin\AppData\Local\Temp\6a81c46a52523e78bfd1615e1c723f30N.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6a81c46a52523e78bfd1615e1c723f30N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\6a81c46a52523e78bfd1615e1c723f30N.exe"2⤵
- Executes dropped EXE
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
859KB
MD5754309b7b83050a50768236ee966224f
SHA110ed7efc2e594417ddeb00a42deb8fd9f804ed53
SHA256acd32dd903e5464b0ecd153fb3f71da520d2e59a63d4c355d9c1874c919d04e6
SHA512e5aaddf62c08c8fcc1ae3f29df220c5c730a2efa96dd18685ee19f5a9d66c4735bb4416c4828033661990604669ed345415ef2dc096ec75e1ab378dd804b1614
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
105KB
MD5a2f4b4b3b95baacc9e50a80859827dc4
SHA10974dc3eea6b52d714a9b6f9ea94a18ad6058634
SHA2560ac828da851c6abfdd413117d1ca26d9ca9a82de4a2da1110b593755a36e9730
SHA512c0a158d239735eac355bb4b6665ea1800674ecdbdd13cb101ace11c1e1964382bee2a624ee13243c131e5dc848b60eb1e5d33814961b0af75b1113a9bf536e5a