Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:32
Behavioral task
behavioral1
Sample
NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe
Resource
win7-20231020-en
General
-
Target
NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe
-
Size
289KB
-
MD5
cbe905ebeb4510ebbeae76aacfac70e0
-
SHA1
c6e815b74120f8e9aa50d3eb45af24a895e3c6e4
-
SHA256
4410d3de681f8c4f4cb4f55fe465384c4d0d5e9403e505d4f7ab78e16e9e991e
-
SHA512
308e219b417b7bdab974830111fd3568a02015f08ac8942b1e96d8ea97acdc70a9176e3438fcba93d3a4beeb029d7199eb2ed1704e6b483cfce44af7ee346ddc
-
SSDEEP
6144:1VzEZ5YgoSsj/ZQUWvYqDUbsbX6EdK77RXW7VGwrLO8O7Pf:a7oSOWUWvXbX5g7pW7Jg
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
121.88.5.182
112.223.217.101
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 sander.exe -
resource yara_rule behavioral2/memory/2856-0-0x0000000000960000-0x00000000009FC000-memory.dmp upx behavioral2/memory/2856-1-0x0000000000960000-0x00000000009FC000-memory.dmp upx behavioral2/memory/2856-2-0x0000000000960000-0x00000000009FC000-memory.dmp upx behavioral2/files/0x0006000000022e00-8.dat upx behavioral2/files/0x0006000000022e00-10.dat upx behavioral2/files/0x0006000000022e00-12.dat upx behavioral2/memory/4864-13-0x0000000000300000-0x000000000039C000-memory.dmp upx behavioral2/memory/2856-16-0x0000000000960000-0x00000000009FC000-memory.dmp upx behavioral2/memory/4864-19-0x0000000000300000-0x000000000039C000-memory.dmp upx behavioral2/memory/4864-26-0x0000000000300000-0x000000000039C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2856 wrote to memory of 4864 2856 NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe 92 PID 2856 wrote to memory of 4864 2856 NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe 92 PID 2856 wrote to memory of 4864 2856 NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe 92 PID 2856 wrote to memory of 324 2856 NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe 93 PID 2856 wrote to memory of 324 2856 NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe 93 PID 2856 wrote to memory of 324 2856 NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.cbe905ebeb4510ebbeae76aacfac70e0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
PID:4864
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵PID:324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287B
MD5e5e2df68e6158600bf30e8444cffaef4
SHA1f70fb7d2c97bad899d4db34f84b1db260cb88ce5
SHA256d3e5489f1e1fefa0eb79519d1df6e1adeb16d9832362dbb9a3bae3ed3c6a3271
SHA512e5063d720663677cf43520db22fcb60d59ac71582b8029e956ffab0995c8c1ad6604cc2eeb1fec077c588559e4a8833fa5d700a9d42d7b516e2fb26587a1982e
-
Filesize
512B
MD5478fec1df0aef79beb699928cb2787fa
SHA1dfff00b9eceaebff908ca9681320d4c770f14814
SHA256c186c06d9bed7785981b05d4c474afd33a83f9ef0e8f5a558505a44af519ec30
SHA5129875eb579e6ab7d8595be86eb53bb8aec6b6d09af4f96742aea1dbcf21fda7e1b7bb561ad5bdbc560472d94e76eca975e33d8ca9ae6e30d1261b86dbb511cf6f
-
Filesize
289KB
MD5b3659aec42ada775a8abdcd9459e3271
SHA15c295fc969e02b584043588ceb629dc0ffc41425
SHA2563f00e6120e71946aff6e3f08cad2659eb2fd99bb74bf0d045473bc8728306efc
SHA5125bdfce92a04cbbe6d0561a3b722150b25e9169afc0e788e01a2ebfbefbca3f0b18f721993179fee90b71a56f1a2691b8e3544d14b9ce5901022c0aa9cfa7a70f
-
Filesize
289KB
MD5b3659aec42ada775a8abdcd9459e3271
SHA15c295fc969e02b584043588ceb629dc0ffc41425
SHA2563f00e6120e71946aff6e3f08cad2659eb2fd99bb74bf0d045473bc8728306efc
SHA5125bdfce92a04cbbe6d0561a3b722150b25e9169afc0e788e01a2ebfbefbca3f0b18f721993179fee90b71a56f1a2691b8e3544d14b9ce5901022c0aa9cfa7a70f
-
Filesize
289KB
MD5b3659aec42ada775a8abdcd9459e3271
SHA15c295fc969e02b584043588ceb629dc0ffc41425
SHA2563f00e6120e71946aff6e3f08cad2659eb2fd99bb74bf0d045473bc8728306efc
SHA5125bdfce92a04cbbe6d0561a3b722150b25e9169afc0e788e01a2ebfbefbca3f0b18f721993179fee90b71a56f1a2691b8e3544d14b9ce5901022c0aa9cfa7a70f