Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9fb61031d5668495a1eef6a7ae74b4a0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.9fb61031d5668495a1eef6a7ae74b4a0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.9fb61031d5668495a1eef6a7ae74b4a0.exe
-
Size
111KB
-
MD5
9fb61031d5668495a1eef6a7ae74b4a0
-
SHA1
a6d886f86da2ea86aa7acfb5dd9470d3862e3fb2
-
SHA256
1b5fa19be9b4e4a48f5d1fc7b6042572ee34e5300985aca1112dfc75268dd897
-
SHA512
6457556c91af8f50c0f852338b06822faffd542e12a8b55e664e57b4499d6e2d80237fc29c5bb0e8b1a6cf50e98da448a90d81233d5a783fbc36aa92a10db5aa
-
SSDEEP
3072:mvz05zKu6jOKuNKEuWKDhm5mlXwWRfemB3GikaVrrQ1IPnHFIb:Jyhm5m9RoiXVr01IP0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation NEAS.9fb61031d5668495a1eef6a7ae74b4a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4652 wrote to memory of 1652 4652 NEAS.9fb61031d5668495a1eef6a7ae74b4a0.exe 91 PID 4652 wrote to memory of 1652 4652 NEAS.9fb61031d5668495a1eef6a7ae74b4a0.exe 91 PID 4652 wrote to memory of 1652 4652 NEAS.9fb61031d5668495a1eef6a7ae74b4a0.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9fb61031d5668495a1eef6a7ae74b4a0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9fb61031d5668495a1eef6a7ae74b4a0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Zxj..bat" > nul 2> nul2⤵PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220B
MD57e8729e623b685db0432eb4982d5114f
SHA154e114a357597ef380162553a970f0298ffaf916
SHA256de7c8c4d75144b88fe501e5750e4c943c29e3306453625c46fda545ca2d26b99
SHA512c0540eb8219f83393b532f00aa5eac504469201550cb719999e85abdc10e2081ec05bb56ab8cbd02be94d3d2b397abcdccbde3eff2d162cee9d746cc57e179ba