Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2023, 16:47

General

  • Target

    easyMalicious2389fb6b489d.exe

  • Size

    40KB

  • MD5

    5871912d5f8a255737aee4003c7bd87e

  • SHA1

    fa7a080b1ff86abfecdf361009d7d37cd2493d7f

  • SHA256

    6f08ed8cb5db2a58e69ec020bee500e0dc57b03a7ea548c9c9827e9702a565d0

  • SHA512

    855c98bee41a53a2261146a4602c95b45db458c9c958fb931a0a50fab9670aafe5678b25fdc546651ef5dac75476396b8f0027bd26880f6c936c0765cc3419fb

  • SSDEEP

    768:KyxqjQl/EMQt4Oei7RwsHxyP7nbxzOQdJBuq:9xqjQ+P04wsmJC0

Malware Config

Signatures

  • Detect Neshta payload 18 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious2389fb6b489d.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious2389fb6b489d.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    PID:5012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

    Filesize

    2.4MB

    MD5

    122e7a5aaf1180d6d6cd38c113f22b6a

    SHA1

    93ced5c44d830efb14568e21e3803f26462ba801

    SHA256

    3a80a34a759ac761bfc2aec2f5517c5b2cb118bb99da0d8c0132613b4a63d9b4

    SHA512

    d3d885f21467bf72c7ef9735db50df793b1d88f1ae565b3704376c4792b04829f27f41aaf87ee1fd11453d2d35b55dbbef59e010f37fbbc12103b24fdb61f4f6

  • C:\Users\Admin\AppData\Local\Temp\3582-490\easyMalicious2389fb6b489d.exe

    Filesize

    40KB

    MD5

    98c5beb53845d09fefeca4e30b8ec62c

    SHA1

    2349160af9403c0d65a9b02a7a16c05139e2ed80

    SHA256

    4798631d87419b2d8d2087e48a1d28b0c4299b7e32ae32582c211b7cf304ddf4

    SHA512

    6990ba3f01b8efe67121f9ec7a953e4b121df14917c64bc80259cf65107b8d16d1611d81525ad2ed444d57bae0f893ae274194304f4b98d6465604f1262db70d

  • memory/5012-225-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-226-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-160-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-222-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-223-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-224-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-133-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-147-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-227-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-228-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-229-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-230-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-231-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-232-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-234-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5012-235-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB