Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    105s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 21:26

General

  • Target

    NEAS.917ddfb1426ecc5efa1597f1ec0ad250.exe

  • Size

    868KB

  • MD5

    917ddfb1426ecc5efa1597f1ec0ad250

  • SHA1

    15dceab9868e07e7b6bb19eb4f7b0c2f80645456

  • SHA256

    4a2a94b6cef847969aff91623913eee7a7ec6684689d233cd87453e840157951

  • SHA512

    af664700189800fe2cc40ed593453c06be4207c08f13d9d0241de11f67f691b8b50b5f5a08d58ee7ca9733de8d0c624d95eab2ac523126c50243b9cd44acdd4a

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQt4qifJxI406KGhcNis:E5aIwC+Agr6StniB+5

Malware Config

Signatures

  • KPOT

    KPOT is an information stealer that steals user data and account credentials.

  • KPOT Core Executable 3 IoCs
  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 5 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.917ddfb1426ecc5efa1597f1ec0ad250.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.917ddfb1426ecc5efa1597f1ec0ad250.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3536
    • C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.917ddfb1426ecc5efa1597f1ec0ad250.exe
      C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.917ddfb1426ecc5efa1597f1ec0ad250.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:2720
    • C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.917ddfb1426ecc5efa1597f1ec0ad250.exe
      C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.917ddfb1426ecc5efa1597f1ec0ad250.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3400

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.917ddfb1426ecc5efa1597f1ec0ad250.exe

      Filesize

      868KB

      MD5

      917ddfb1426ecc5efa1597f1ec0ad250

      SHA1

      15dceab9868e07e7b6bb19eb4f7b0c2f80645456

      SHA256

      4a2a94b6cef847969aff91623913eee7a7ec6684689d233cd87453e840157951

      SHA512

      af664700189800fe2cc40ed593453c06be4207c08f13d9d0241de11f67f691b8b50b5f5a08d58ee7ca9733de8d0c624d95eab2ac523126c50243b9cd44acdd4a

    • C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.917ddfb1426ecc5efa1597f1ec0ad250.exe

      Filesize

      868KB

      MD5

      917ddfb1426ecc5efa1597f1ec0ad250

      SHA1

      15dceab9868e07e7b6bb19eb4f7b0c2f80645456

      SHA256

      4a2a94b6cef847969aff91623913eee7a7ec6684689d233cd87453e840157951

      SHA512

      af664700189800fe2cc40ed593453c06be4207c08f13d9d0241de11f67f691b8b50b5f5a08d58ee7ca9733de8d0c624d95eab2ac523126c50243b9cd44acdd4a

    • C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.917ddfb1426ecc5efa1597f1ec0ad250.exe

      Filesize

      868KB

      MD5

      917ddfb1426ecc5efa1597f1ec0ad250

      SHA1

      15dceab9868e07e7b6bb19eb4f7b0c2f80645456

      SHA256

      4a2a94b6cef847969aff91623913eee7a7ec6684689d233cd87453e840157951

      SHA512

      af664700189800fe2cc40ed593453c06be4207c08f13d9d0241de11f67f691b8b50b5f5a08d58ee7ca9733de8d0c624d95eab2ac523126c50243b9cd44acdd4a

    • memory/2720-52-0x0000019E24830000-0x0000019E24831000-memory.dmp

      Filesize

      4KB

    • memory/2720-53-0x0000000010000000-0x000000001001E000-memory.dmp

      Filesize

      120KB

    • memory/3400-70-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-68-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-69-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-67-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-71-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-72-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-73-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-74-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-75-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-66-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-65-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-64-0x0000000001600000-0x0000000001601000-memory.dmp

      Filesize

      4KB

    • memory/3400-76-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/3536-18-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-9-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-3-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-4-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-5-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-6-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-14-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-13-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-12-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-11-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-10-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-26-0x0000000002B30000-0x0000000002B59000-memory.dmp

      Filesize

      164KB

    • memory/3536-8-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-7-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-15-0x0000000002B30000-0x0000000002B59000-memory.dmp

      Filesize

      164KB

    • memory/3536-2-0x0000000002290000-0x0000000002291000-memory.dmp

      Filesize

      4KB

    • memory/3536-16-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/3536-19-0x0000000002B30000-0x0000000002B59000-memory.dmp

      Filesize

      164KB

    • memory/4436-37-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-46-0x0000000010000000-0x0000000010007000-memory.dmp

      Filesize

      28KB

    • memory/4436-44-0x0000000002070000-0x0000000002099000-memory.dmp

      Filesize

      164KB

    • memory/4436-57-0x0000000003070000-0x000000000312E000-memory.dmp

      Filesize

      760KB

    • memory/4436-58-0x0000000003170000-0x0000000003439000-memory.dmp

      Filesize

      2.8MB

    • memory/4436-59-0x0000000002070000-0x0000000002099000-memory.dmp

      Filesize

      164KB

    • memory/4436-42-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-41-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/4436-38-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-39-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-35-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-36-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-50-0x0000000002930000-0x0000000002931000-memory.dmp

      Filesize

      4KB

    • memory/4436-34-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-31-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-32-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-33-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-29-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-30-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB

    • memory/4436-28-0x0000000002040000-0x0000000002041000-memory.dmp

      Filesize

      4KB