Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 18:04 UTC

General

  • Target

    NEAS.87e7d4cb4a0d4e2523e03bc159bef7d0.exe

  • Size

    346KB

  • MD5

    87e7d4cb4a0d4e2523e03bc159bef7d0

  • SHA1

    357d1149fe49928e2868238b8cf9598c557a5a7b

  • SHA256

    75161078d75acead13d1a4236df271476c17a7be656cbc536a996cdddc69db5c

  • SHA512

    23279a35049fa7a4dea72f1de343a42f599d0a9e1d02d475548dd8f53aa5ac77ec890d60596b958215150bd080632ece4bef9fe3bde0b546dad5b1d3d2079a55

  • SSDEEP

    6144:8uIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYhuIlWqB+W:X6Wq4aaE6KwyF5L0Y2D1PqLb6Wq4W

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.87e7d4cb4a0d4e2523e03bc159bef7d0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.87e7d4cb4a0d4e2523e03bc159bef7d0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\svhost.exe
      C:\Windows\svhost.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4556

Network

  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.228.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.228.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    126.24.238.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    126.24.238.8.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    59.128.231.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    59.128.231.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    39.142.81.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    39.142.81.104.in-addr.arpa
    IN PTR
    Response
    39.142.81.104.in-addr.arpa
    IN PTR
    a104-81-142-39deploystaticakamaitechnologiescom
  • flag-us
    DNS
    205.47.74.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    205.47.74.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    157.123.68.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    157.123.68.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    126.179.238.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    126.179.238.8.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    208.194.73.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    208.194.73.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    158.240.127.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    158.240.127.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    8.173.189.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.173.189.20.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    9.228.82.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    9.228.82.20.in-addr.arpa

  • 8.8.8.8:53
    126.24.238.8.in-addr.arpa
    dns
    71 B
    125 B
    1
    1

    DNS Request

    126.24.238.8.in-addr.arpa

  • 8.8.8.8:53
    59.128.231.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    59.128.231.4.in-addr.arpa

  • 8.8.8.8:53
    39.142.81.104.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    39.142.81.104.in-addr.arpa

  • 8.8.8.8:53
    205.47.74.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    205.47.74.20.in-addr.arpa

  • 8.8.8.8:53
    157.123.68.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    157.123.68.40.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    126.179.238.8.in-addr.arpa
    dns
    72 B
    126 B
    1
    1

    DNS Request

    126.179.238.8.in-addr.arpa

  • 8.8.8.8:53
    208.194.73.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    208.194.73.20.in-addr.arpa

  • 8.8.8.8:53
    158.240.127.40.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    158.240.127.40.in-addr.arpa

  • 8.8.8.8:53
    8.173.189.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    8.173.189.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Driver.db

    Filesize

    82B

    MD5

    c2d2dc50dca8a2bfdc8e2d59dfa5796d

    SHA1

    7a6150fc53244e28d1bcea437c0c9d276c41ccad

    SHA256

    b2d38b3f122cfcf3cecabf0dfe2ab9c4182416d6961ae43f1eebee489cf3c960

    SHA512

    6cfdd08729de9ee9d1f5d8fcd859144d32ddc0a9e7074202a7d03d3795bdf0027a074a6aa54f451d4166024c134b27c55c7142170e64d979d86c13801f937ce4

  • C:\Windows\svhost.exe

    Filesize

    346KB

    MD5

    367d0ccf543247cffe148b9a3b145575

    SHA1

    3fcf0b4edb4e663f7630e02c2d24d54ab054bc55

    SHA256

    c92d5ddf0395a95833b52d0542a9ce768b0cfef8f2ac851f84bed4735e7e5718

    SHA512

    1ec9d7f35797803f937bcbd6b8307970fa2e1221a5609e92436e50861637bf6df2d6d90f74a6ebd85a329f3ffbaf4d601a7e9a6b3a53ca6b8edf53b1da862eea

  • C:\Windows\svhost.exe

    Filesize

    346KB

    MD5

    367d0ccf543247cffe148b9a3b145575

    SHA1

    3fcf0b4edb4e663f7630e02c2d24d54ab054bc55

    SHA256

    c92d5ddf0395a95833b52d0542a9ce768b0cfef8f2ac851f84bed4735e7e5718

    SHA512

    1ec9d7f35797803f937bcbd6b8307970fa2e1221a5609e92436e50861637bf6df2d6d90f74a6ebd85a329f3ffbaf4d601a7e9a6b3a53ca6b8edf53b1da862eea

  • C:\odt.exe

    Filesize

    346KB

    MD5

    e90e88ef8c53a4177011cab554f31e18

    SHA1

    c38d6ea172011add51953c77303d5029b47d19b0

    SHA256

    a33d8a383d59d4e1efba65f2fd59250384f9503d8cc2678c76f50f89aaae505d

    SHA512

    7c794f7b1f43d0e0833729a68507269b2544a4fa8e46f899a6e3b37b2cb6fa44253b42869172db023196766091f52420b105a6b40f0898bb26f2b0665f67eb1d

  • memory/4416-0-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/4416-284-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/4556-5-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

  • memory/4556-400-0x0000000000400000-0x0000000000523000-memory.dmp

    Filesize

    1.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.