Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    186s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 08:19

General

  • Target

    NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe

  • Size

    932KB

  • MD5

    e0dbd21ca72a28b1447b1e49110b2160

  • SHA1

    93cdb50beab354560a034f979b4d069da07e14f8

  • SHA256

    b9db76350af25816d2fd2f3a43de3d22f43ee82684a78dbef3e4f90259b88fab

  • SHA512

    8b3cae7c523a11b67c7ee9e151d47c7b9b4602240c89d694f7a82922d9ee14ebfe7bc307dc6e684006f8f48b62a273c8c082c11ad478ebbf4f08ecaf4431ca08

  • SSDEEP

    24576:P1/aGLDCM4D8ayGMZo8/Kf6EGdlvZ2eZCGy5csehLPayhqbLXyaXv+R:gD8ayGMZoTf6EGdlvZ2AJy5c3LPacqbg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\ProgramData\alnmf.exe
      "C:\ProgramData\alnmf.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    932KB

    MD5

    852e70ebbf89e546ea7afc3024fa435f

    SHA1

    94588dfb1236be108e822a0b67fcc66f3d4ddf08

    SHA256

    c2318a1eb2a7e2083fa93d0d8910cf672fea6de04a03f2690bb14e5f641d7940

    SHA512

    0cb1e7868b3ccf153d52a17114be29b29bf2569bda6f6a6ce310da623e00fb027dd2e514b90df95674f98b92cb0091ad689f8d7714b812dc00e56a6d5a6f2dc7

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    70d6cb7dd01ebd5a21af02945d2ae12f

    SHA1

    05260b3e17a221e66b58d1e5ed1d0f518392159a

    SHA256

    136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92

    SHA512

    b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    70d6cb7dd01ebd5a21af02945d2ae12f

    SHA1

    05260b3e17a221e66b58d1e5ed1d0f518392159a

    SHA256

    136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92

    SHA512

    b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9

  • C:\ProgramData\alnmf.exe

    Filesize

    454KB

    MD5

    47df574859f63a374bd53d5547df2829

    SHA1

    1b07df9f450870d5215844d661d0281853bb7dc5

    SHA256

    0adb3e09c8eb7caa537fd16d01083f6a7843969033a4719fe27376767b8a8c68

    SHA512

    83248c557a4bf5d8484decae5a28f693e48863974cfecf5f389a96f76a7f095c96680fc50a01e3c3d4a19834e821d446941d88591be367fe17ac6d4e7a1b33fa

  • C:\ProgramData\alnmf.exe

    Filesize

    454KB

    MD5

    47df574859f63a374bd53d5547df2829

    SHA1

    1b07df9f450870d5215844d661d0281853bb7dc5

    SHA256

    0adb3e09c8eb7caa537fd16d01083f6a7843969033a4719fe27376767b8a8c68

    SHA512

    83248c557a4bf5d8484decae5a28f693e48863974cfecf5f389a96f76a7f095c96680fc50a01e3c3d4a19834e821d446941d88591be367fe17ac6d4e7a1b33fa

  • memory/2584-7-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4840-45-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4840-72-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4840-191-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4840-284-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB