Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 08:20

General

  • Target

    NEAS.e7c92559710c81b98c13caa39f08e9c0.exe

  • Size

    248KB

  • MD5

    e7c92559710c81b98c13caa39f08e9c0

  • SHA1

    5d81f47cc462dd1d117bc6ded76bc81e2674a833

  • SHA256

    20fac48ebd70399d520dd1239b2c3ba14d750310c14966cbd4903aafd4b3f2e9

  • SHA512

    20a05f9226cb5315ea86d4497233440ffd3ecd6822ec6ac71ea49bd4042f6dc1f4f108ac83652dbf6cd578ed3bb408c3cbec0fcfbb776825038e939c716fda7c

  • SSDEEP

    6144:anNVQ/yyUf9dP9LAVRKlqBiErIsKnPmb7/jWal+FfAje+5/RxoOsutOSD/uP39R/:anZyUf9oRKlqgErIsKnPmb7/jWa1e+5T

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e7c92559710c81b98c13caa39f08e9c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e7c92559710c81b98c13caa39f08e9c0.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\foioxij.exe
      "C:\Users\Admin\foioxij.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\foioxij.exe

    Filesize

    248KB

    MD5

    7eedb47ce07d0a01903b51406c90bc59

    SHA1

    8acb955915f9dbab5f9ec9e5c68e9714a36dfab8

    SHA256

    119dace3270c2a602bae281dd052229373c750da40a10b7eb97984622259acca

    SHA512

    75f787b3abb2f156c7c58011e710b622f9a2649a256619aac89bb99d416789123aab1e27f4b06a810f4fe398c3ccfefb7cbc58d377d23c15d9ebd6e7e581828c

  • C:\Users\Admin\foioxij.exe

    Filesize

    248KB

    MD5

    7eedb47ce07d0a01903b51406c90bc59

    SHA1

    8acb955915f9dbab5f9ec9e5c68e9714a36dfab8

    SHA256

    119dace3270c2a602bae281dd052229373c750da40a10b7eb97984622259acca

    SHA512

    75f787b3abb2f156c7c58011e710b622f9a2649a256619aac89bb99d416789123aab1e27f4b06a810f4fe398c3ccfefb7cbc58d377d23c15d9ebd6e7e581828c

  • C:\Users\Admin\foioxij.exe

    Filesize

    248KB

    MD5

    7eedb47ce07d0a01903b51406c90bc59

    SHA1

    8acb955915f9dbab5f9ec9e5c68e9714a36dfab8

    SHA256

    119dace3270c2a602bae281dd052229373c750da40a10b7eb97984622259acca

    SHA512

    75f787b3abb2f156c7c58011e710b622f9a2649a256619aac89bb99d416789123aab1e27f4b06a810f4fe398c3ccfefb7cbc58d377d23c15d9ebd6e7e581828c