Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b0749aae554986bfa0d35f20e2f2f740.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.b0749aae554986bfa0d35f20e2f2f740.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.b0749aae554986bfa0d35f20e2f2f740.exe
-
Size
200KB
-
MD5
b0749aae554986bfa0d35f20e2f2f740
-
SHA1
80fe356b51fdd237ddf856ca897fa9e38286d97a
-
SHA256
384fe222a93548118e8b3173247f69fabcd028e54f6f16a7ee61ae1e89edf38d
-
SHA512
3d968f553605edc7476c99bd179ef5ae3969471298e848ee064a5fd6f2ef0688805facf078a4c1dc51628a9c5f1f0b3422baf352f389eab802f80cd029a70097
-
SSDEEP
768:J/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfL/:JRsvcdcQjosnvnZ6LQ1E/
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation NEAS.b0749aae554986bfa0d35f20e2f2f740.exe -
Executes dropped EXE 1 IoCs
pid Process 760 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.b0749aae554986bfa0d35f20e2f2f740.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.b0749aae554986bfa0d35f20e2f2f740.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF NEAS.b0749aae554986bfa0d35f20e2f2f740.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe 760 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3208 wrote to memory of 760 3208 NEAS.b0749aae554986bfa0d35f20e2f2f740.exe 86 PID 3208 wrote to memory of 760 3208 NEAS.b0749aae554986bfa0d35f20e2f2f740.exe 86 PID 3208 wrote to memory of 760 3208 NEAS.b0749aae554986bfa0d35f20e2f2f740.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b0749aae554986bfa0d35f20e2f2f740.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b0749aae554986bfa0d35f20e2f2f740.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD57bf92d1e0196fb774961851d01db3673
SHA1ef30660cc6823a6ba36e6be6e327aa1227565d1c
SHA2560f74a093ac39bd1850330ea7196aff52db5b9a1cb02905e2ac0557cb34ab72b6
SHA51212d8b21b5854e5258011f267d38751f38674390a4264c6bf47986abebdb9a215f0cd2fe91b44385184fcffa07892be00bf68b95a6a1b122cbcb3c5a1384582ee
-
Filesize
200KB
MD57bf92d1e0196fb774961851d01db3673
SHA1ef30660cc6823a6ba36e6be6e327aa1227565d1c
SHA2560f74a093ac39bd1850330ea7196aff52db5b9a1cb02905e2ac0557cb34ab72b6
SHA51212d8b21b5854e5258011f267d38751f38674390a4264c6bf47986abebdb9a215f0cd2fe91b44385184fcffa07892be00bf68b95a6a1b122cbcb3c5a1384582ee
-
Filesize
200KB
MD57bf92d1e0196fb774961851d01db3673
SHA1ef30660cc6823a6ba36e6be6e327aa1227565d1c
SHA2560f74a093ac39bd1850330ea7196aff52db5b9a1cb02905e2ac0557cb34ab72b6
SHA51212d8b21b5854e5258011f267d38751f38674390a4264c6bf47986abebdb9a215f0cd2fe91b44385184fcffa07892be00bf68b95a6a1b122cbcb3c5a1384582ee