Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:29
Behavioral task
behavioral1
Sample
NEAS.b2200d78c0a035d1a95db0652159cfe0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.b2200d78c0a035d1a95db0652159cfe0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.b2200d78c0a035d1a95db0652159cfe0.exe
-
Size
93KB
-
MD5
b2200d78c0a035d1a95db0652159cfe0
-
SHA1
376e897f240c7a72dc1a8f39bb507444b3d003fb
-
SHA256
38512ffcc86b7ac49cab9e0c3dcd395e46dacb989fa94dd026e816755119544d
-
SHA512
17afefce5f03c9d13a0fdf35752ac4b713664e64be18959f03913ec5e0c545bc562ab6f7f1c243905bc98798e1f0356e84d29c196f7a08efcf66015168432d03
-
SSDEEP
1536:2QxRQHgur/cgllYSNW2F6Q95xdZrqlr24:BRQAuwQ95xdZr0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2428 yokitoki.exe -
resource yara_rule behavioral2/memory/1644-0-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1644-1-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/files/0x0009000000022d1d-4.dat upx behavioral2/files/0x0009000000022d1d-5.dat upx behavioral2/memory/2428-6-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 38 icanhazip.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2428 1644 NEAS.b2200d78c0a035d1a95db0652159cfe0.exe 88 PID 1644 wrote to memory of 2428 1644 NEAS.b2200d78c0a035d1a95db0652159cfe0.exe 88 PID 1644 wrote to memory of 2428 1644 NEAS.b2200d78c0a035d1a95db0652159cfe0.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b2200d78c0a035d1a95db0652159cfe0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b2200d78c0a035d1a95db0652159cfe0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\yokitoki.exeC:\Users\Admin\AppData\Local\Temp\yokitoki.exe2⤵
- Executes dropped EXE
PID:2428
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD544f2b22dc3804db5ff4fb722aa6123fa
SHA1efd9b077ce106fc5130114539ab41e2eb2aded99
SHA2569b4be343caa1ef662aeb6231e8b89e94cc39f126ea9d1aa6ddc52c6cf8ec2909
SHA5125b63acd7d8ee870f219c0857f0420895731ebf646b2ff49d6c91fef9b81bcc7bb80cf97d8e60b8e5916ebb7882dad86b88bb39553ecb38f61de9496eccf6ce7d
-
Filesize
93KB
MD544f2b22dc3804db5ff4fb722aa6123fa
SHA1efd9b077ce106fc5130114539ab41e2eb2aded99
SHA2569b4be343caa1ef662aeb6231e8b89e94cc39f126ea9d1aa6ddc52c6cf8ec2909
SHA5125b63acd7d8ee870f219c0857f0420895731ebf646b2ff49d6c91fef9b81bcc7bb80cf97d8e60b8e5916ebb7882dad86b88bb39553ecb38f61de9496eccf6ce7d