Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 11:04
Behavioral task
behavioral1
Sample
NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe
-
Size
79KB
-
MD5
08b41e1a7ace2b460f2de24eb16e32e0
-
SHA1
94745a70cb4aa07e0c07bcf3cda12edb69d19a09
-
SHA256
da6c74cb0fdf12898b9240f2df30c96724a0dca8ee90320177fa0b74ca70925a
-
SHA512
0c1f4fb25ae469005ea5a1b2ea6b9069cbd56876295feeff7d861ff49cb714041b25929c648d2acca05a3796930776d0c0570e0885c3b5af3b7cdbaf3682645b
-
SSDEEP
1536:Q4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4m2n94RmDWQzjoCoE:Q4X6NSyfnpijeYEoIcq4l94RPCoE
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4192-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/files/0x0006000000023256-6.dat upx behavioral2/memory/4192-28-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4192-29-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\msncracker.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\GTA 3 Crack.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Lolita preteen sex.mpeg.pif NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Jenna Jamison Dildo Humping.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Grand theft auto 3 CD1 crack.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\AIM Account Hacker.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\AIM Flooder.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\kill osama bin laden game.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Yahoo mail cracker.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Website Hacker.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Counter Strike CD Keygen.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Universal Game Crack.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Blonde and Japanese girl bukkake.mpg.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Pamela Anderson.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\GTA 3 Serial.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Harry Potter and the sorcerors stone.divx.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\fetish bondage preteen porno.mpg.pif NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\porn account cracker.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\winxcfg.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\jenna jameson sex scene huge dick blowjob.scr NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\hotmailhacker.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\icqcracker.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Winzip.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - shower scene.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\teen tied up and raped.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\Pamela Anderson And Tommy Lee Home Video (Part 1).mpg.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe File created C:\Windows\SysWOW64\macromd\OfficeXP Keygen.exe NEAS.08b41e1a7ace2b460f2de24eb16e32e0_JC.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD57cc0ff094d2ecd0663876ed46113c938
SHA132ff1bf14e78f9c841f3eebea2414fd8011b720c
SHA25607a1d37157d00f73492e6c28a9576690c3cf54ec5380dc499a358ae9e78255c5
SHA51225f51e3b707646980d6ad5355bb2678e6a9b2dc4f43c992ac569508371a33d2c333d83f02a7f0dc1cb9cf34e04ff254b8d3ef834645efecd6c1b1e88d9d5176e