Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 16:26

General

  • Target

    NEAS.08abe5dca7bdaf7be5ee635b64a5e4d0_JC.exe

  • Size

    487KB

  • MD5

    08abe5dca7bdaf7be5ee635b64a5e4d0

  • SHA1

    4ad4be48e71788e4cb9aa781f1445116029fa8f0

  • SHA256

    4fa67b74231f1e0e1d09d7e8c63d4332595effc2761b9779cb381b9769a48fed

  • SHA512

    b2d9b4cd15ae41e73c91e72e5b1b745f41504235e3776cf362b4967799f9b5a4a86717b1aa6cee0666fb15acc9a01463719731a4fbf8d218e0df3a615825e300

  • SSDEEP

    6144:dMeftb6+Imb285B+zv0AtfwN+IhMdrOVfnPUQDW0/tCB6tPCUBejJL0KiNeLbpca:Octbhb2IB+3tI+sOCtAUBULlTnpcaP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.08abe5dca7bdaf7be5ee635b64a5e4d0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.08abe5dca7bdaf7be5ee635b64a5e4d0_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4984
    • C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe
      "\\.\C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3076
    • C:\Users\Admin\AppData\Local\Temp\NEAS.08abe5dca7bdaf7be5ee635b64a5e4d0_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.08abe5dca7bdaf7be5ee635b64a5e4d0_JC.exe" silent pause
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4844
      • C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe
        "\\.\C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe

    Filesize

    488KB

    MD5

    e4bb823703df7041b14b78f11a5aaa45

    SHA1

    96bd60943396d3e12dc171b211de1caf78f4df66

    SHA256

    7ea1e89af09c363495ac82df368e02a40ffa16d8e7463bea30fe905a7033cf68

    SHA512

    98517b4fb824a187ec617d9681404dad1240261d6950ff2712affb8a353d0fc81dbe545cc04262c5e3fbf8cb3e11070d344940754d8eb4727d77b4e4ddca738d

  • C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe

    Filesize

    488KB

    MD5

    e4bb823703df7041b14b78f11a5aaa45

    SHA1

    96bd60943396d3e12dc171b211de1caf78f4df66

    SHA256

    7ea1e89af09c363495ac82df368e02a40ffa16d8e7463bea30fe905a7033cf68

    SHA512

    98517b4fb824a187ec617d9681404dad1240261d6950ff2712affb8a353d0fc81dbe545cc04262c5e3fbf8cb3e11070d344940754d8eb4727d77b4e4ddca738d

  • C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe

    Filesize

    488KB

    MD5

    e4bb823703df7041b14b78f11a5aaa45

    SHA1

    96bd60943396d3e12dc171b211de1caf78f4df66

    SHA256

    7ea1e89af09c363495ac82df368e02a40ffa16d8e7463bea30fe905a7033cf68

    SHA512

    98517b4fb824a187ec617d9681404dad1240261d6950ff2712affb8a353d0fc81dbe545cc04262c5e3fbf8cb3e11070d344940754d8eb4727d77b4e4ddca738d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe

    Filesize

    488KB

    MD5

    c5b9cbcd8b75c2cc4db85d861352b949

    SHA1

    9c44e1418ec029674fb5dfb5bfc79164e563cec5

    SHA256

    a7a773297cd6b50f235545634063404304fa3a7bbb6eef6ee7e4a9f8d5544f97

    SHA512

    3aae57bf97df45fcce60dd0176659d5016f4f7c2cfc88a1fd9fb19e0a8819c573e604f3670563c2fd4b96e968464c48a76e96800404a7a84cacc168668a8d45a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe

    Filesize

    488KB

    MD5

    c5b9cbcd8b75c2cc4db85d861352b949

    SHA1

    9c44e1418ec029674fb5dfb5bfc79164e563cec5

    SHA256

    a7a773297cd6b50f235545634063404304fa3a7bbb6eef6ee7e4a9f8d5544f97

    SHA512

    3aae57bf97df45fcce60dd0176659d5016f4f7c2cfc88a1fd9fb19e0a8819c573e604f3670563c2fd4b96e968464c48a76e96800404a7a84cacc168668a8d45a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe

    Filesize

    488KB

    MD5

    c5b9cbcd8b75c2cc4db85d861352b949

    SHA1

    9c44e1418ec029674fb5dfb5bfc79164e563cec5

    SHA256

    a7a773297cd6b50f235545634063404304fa3a7bbb6eef6ee7e4a9f8d5544f97

    SHA512

    3aae57bf97df45fcce60dd0176659d5016f4f7c2cfc88a1fd9fb19e0a8819c573e604f3670563c2fd4b96e968464c48a76e96800404a7a84cacc168668a8d45a

  • C:\Users\Admin\AppData\Roaming\Microsoft\persist.dat

    Filesize

    10B

    MD5

    686734eef20b7164ba1ff82eaa823183

    SHA1

    d06bbc1b88b84b1e7b788e49c961877862dfa557

    SHA256

    ac02fbe93ae8ba6ecb7eb553a152b8962a4c7eecf03828a4967ca13d5e75f040

    SHA512

    bdd981873f034bff1be819037eaa8680644c549dc2ad9ea66fee37ccb0d017b222059a7f78ddf61aa1be0e642b8655d4d90ec5feb23fe73393585ac0de0b7361

  • memory/2652-0-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2652-50-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2652-15-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2652-1-0x0000000063080000-0x00000000631EC000-memory.dmp

    Filesize

    1.4MB

  • memory/2672-73-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2672-51-0x0000000063080000-0x00000000631EC000-memory.dmp

    Filesize

    1.4MB

  • memory/3076-62-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/3076-38-0x0000000063080000-0x00000000631EC000-memory.dmp

    Filesize

    1.4MB

  • memory/3076-36-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/4844-93-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/4844-67-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/4932-70-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/4932-69-0x0000000063080000-0x00000000631EC000-memory.dmp

    Filesize

    1.4MB

  • memory/4932-92-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/4984-20-0x0000000063080000-0x00000000631EC000-memory.dmp

    Filesize

    1.4MB

  • memory/4984-48-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/4984-18-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB