Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 18:49
Behavioral task
behavioral1
Sample
NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe
-
Size
392KB
-
MD5
a9ee5717f9ed4aa52358a2dce5cd24e6
-
SHA1
fb07be112019076233e0012986e97738c06b9ea4
-
SHA256
984d9cf4b34ed3602c3773af5aa6634f0fde8f5014412ff69064f40b53ca86e4
-
SHA512
ace8009bb0a17385a51ec52e83f72edb1551a29a7c76c9c921d1e05ad75315318d66becf96111d4cc6ac12e78caa9090a05b3a416fcbd5ea3badeb9565ba75ab
-
SSDEEP
12288:fEOZQtZVa6JdD/lHoOMzXCGOoIVdDHMxj:fE1HVa2dDNIrrCGOoQDAj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation zyxuu.exe -
Executes dropped EXE 2 IoCs
pid Process 4160 zyxuu.exe 2124 roomp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe 2124 roomp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2124 roomp.exe Token: SeIncBasePriorityPrivilege 2124 roomp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1172 wrote to memory of 4160 1172 NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe 88 PID 1172 wrote to memory of 4160 1172 NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe 88 PID 1172 wrote to memory of 4160 1172 NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe 88 PID 1172 wrote to memory of 4272 1172 NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe 89 PID 1172 wrote to memory of 4272 1172 NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe 89 PID 1172 wrote to memory of 4272 1172 NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe 89 PID 4160 wrote to memory of 2124 4160 zyxuu.exe 100 PID 4160 wrote to memory of 2124 4160 zyxuu.exe 100 PID 4160 wrote to memory of 2124 4160 zyxuu.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\zyxuu.exe"C:\Users\Admin\AppData\Local\Temp\zyxuu.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\roomp.exe"C:\Users\Admin\AppData\Local\Temp\roomp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵PID:4272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD570f5f3d86a52653f179a833e5cc41241
SHA1ba76332fc40e2ba4e0d3baba6be290249d4fdd64
SHA256fcebea282d9e05680c0864aafaa294bd31bfd3fe6e1bee3462169cdc922dcd40
SHA512065ec402443442d969e6d67e19e60d8a0b9a1529cc926c8b54a1754b6098d785c4645e75dbb0578218c4bc5346bf1b126bb96419e962bad1b3c03fdae8273eab
-
Filesize
512B
MD5593b447cb1ec56e80388316e6e867afa
SHA1daf05a0950336d3fdef0c9902e5014811f5f3605
SHA2565bbd34cfbaf7ae4c90a2a8fede8564f174b499b6e327a5004d9ab02989d00bcf
SHA5128384f3e8c43accb3cbb93cb0f4159c4bf924f28d388b368bdb66f939f6ee4795ccdbeccb85ac3d16e3a0ae74966171291ad54f3f2713dc08ebb56d75dc9a1a57
-
Filesize
182KB
MD5ba176833bf5e935a32048cbdc526aded
SHA16066cdc6cda1e4f92d28bca734193801d4946bd5
SHA256608cf156567894191df302c6579a5db6085f969c16dea5eb5c3c894a96f2a983
SHA5127be97362ce4ce942583307fbae4554066aea8e4211e3de7ee85ddb86f822a6c4ce79dc1ab631f54e67893ac6f87fdf792bef01c86069414652c70c72fbf93277
-
Filesize
182KB
MD5ba176833bf5e935a32048cbdc526aded
SHA16066cdc6cda1e4f92d28bca734193801d4946bd5
SHA256608cf156567894191df302c6579a5db6085f969c16dea5eb5c3c894a96f2a983
SHA5127be97362ce4ce942583307fbae4554066aea8e4211e3de7ee85ddb86f822a6c4ce79dc1ab631f54e67893ac6f87fdf792bef01c86069414652c70c72fbf93277
-
Filesize
182KB
MD5ba176833bf5e935a32048cbdc526aded
SHA16066cdc6cda1e4f92d28bca734193801d4946bd5
SHA256608cf156567894191df302c6579a5db6085f969c16dea5eb5c3c894a96f2a983
SHA5127be97362ce4ce942583307fbae4554066aea8e4211e3de7ee85ddb86f822a6c4ce79dc1ab631f54e67893ac6f87fdf792bef01c86069414652c70c72fbf93277
-
Filesize
392KB
MD509aadd779b15aa9d7a1e78e796c2e574
SHA15de7018b2dea881ab5b7f0f5b3ff69096d93daf8
SHA256ed442deed1ed8613d4bec0c6b65b75e83a72b33e5d928f08bcba4d5d6401ac7e
SHA512c7a81fff285f60e5e922a890328a36945e816a50b53b2c0d68861be18a5a4d8ad8ce69ce9957ed8006a135d301dbff0d17129bcaf49b1f26737736833cc0464d
-
Filesize
392KB
MD509aadd779b15aa9d7a1e78e796c2e574
SHA15de7018b2dea881ab5b7f0f5b3ff69096d93daf8
SHA256ed442deed1ed8613d4bec0c6b65b75e83a72b33e5d928f08bcba4d5d6401ac7e
SHA512c7a81fff285f60e5e922a890328a36945e816a50b53b2c0d68861be18a5a4d8ad8ce69ce9957ed8006a135d301dbff0d17129bcaf49b1f26737736833cc0464d
-
Filesize
392KB
MD509aadd779b15aa9d7a1e78e796c2e574
SHA15de7018b2dea881ab5b7f0f5b3ff69096d93daf8
SHA256ed442deed1ed8613d4bec0c6b65b75e83a72b33e5d928f08bcba4d5d6401ac7e
SHA512c7a81fff285f60e5e922a890328a36945e816a50b53b2c0d68861be18a5a4d8ad8ce69ce9957ed8006a135d301dbff0d17129bcaf49b1f26737736833cc0464d