Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4f49e7c3013091206bb7c478d99c8f9d_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4f49e7c3013091206bb7c478d99c8f9d_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4f49e7c3013091206bb7c478d99c8f9d_JC.exe
-
Size
396KB
-
MD5
4f49e7c3013091206bb7c478d99c8f9d
-
SHA1
8199c8d6593ee17bf7018789ec6a2c33e03a1784
-
SHA256
22d2151b0e4cb58c5be0a2a7ea935e163e4f10fe23738f9e63fdd016e0bc0aea
-
SHA512
871433be4c3aae20e3563e7557889bbbeead734946955800099d025e572db2aa17ce42f47bb546db8aa9967cbd3c243674bda885a419d5617c34b5d0f4a24460
-
SSDEEP
6144:4jlYKRF/LReWAsUybmMgZ9Rs/Reqi2UmBZ9xED:4jauDReWtmMui/ReqYD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4960 wuqmsk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\wuqmsk.exe" wuqmsk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1148 wrote to memory of 4960 1148 NEAS.4f49e7c3013091206bb7c478d99c8f9d_JC.exe 89 PID 1148 wrote to memory of 4960 1148 NEAS.4f49e7c3013091206bb7c478d99c8f9d_JC.exe 89 PID 1148 wrote to memory of 4960 1148 NEAS.4f49e7c3013091206bb7c478d99c8f9d_JC.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4f49e7c3013091206bb7c478d99c8f9d_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4f49e7c3013091206bb7c478d99c8f9d_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\ProgramData\wuqmsk.exe"C:\ProgramData\wuqmsk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD555a0231ee2573ebb00d341afa0da2836
SHA11de674ed261076923a4ea725d720568ddee9bb15
SHA256dc8237e204d30c03ef85fa1b0e33d4b9bcbcdfe76f3d8c0fac1372905eeed755
SHA5129d7b5fe17448061fe675aa14cc725db1049cb24a666e9fc75feddc1c588f9e9edf3c6027c7062f953d559c0aac5db3bbcb014d9c10d89a2ef9dc7d1a46783bf3
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
259KB
MD5e7fd8f4067f122fdb879c958b8c6687a
SHA11b046191d45fea8fd2d77f33f355c571b60fe100
SHA256852145152aabcf9471fd19d222060fcd6208b418ca8e688d10cafe3db6065322
SHA51279a560e41c442d7d11ca7e4840a3ff4716f786ac2992d26472638245f45bfb4a3389fd94db77e571dd78f136ca5dd704b639627f545687c4d1b1849e5d8e3bba
-
Filesize
259KB
MD5e7fd8f4067f122fdb879c958b8c6687a
SHA11b046191d45fea8fd2d77f33f355c571b60fe100
SHA256852145152aabcf9471fd19d222060fcd6208b418ca8e688d10cafe3db6065322
SHA51279a560e41c442d7d11ca7e4840a3ff4716f786ac2992d26472638245f45bfb4a3389fd94db77e571dd78f136ca5dd704b639627f545687c4d1b1849e5d8e3bba