Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/10/2023, 16:46

General

  • Target

    NEAS.07c31b8c9477c36c80c6a555832b3be0.exe

  • Size

    1.7MB

  • MD5

    07c31b8c9477c36c80c6a555832b3be0

  • SHA1

    258d6bd264632b95a07c5c45dc90883fd9efa62b

  • SHA256

    de769c7b39d44bd9bd3ebb02e12e49c90ab4e55ac0de000096fb6841c14df4d2

  • SHA512

    f63d9fea4aa689cb2178405254db8b0f75f11221e35eeaba88f9f71445d9f727e68763f6ab9eb0b01e19032ab6390f45a21e687c2fca0105dfbc1b3596a502a7

  • SSDEEP

    49152:MtIWcS4neHbyfYTOYKObutmkO+wAOInO4XrztygxLHkJE4VBq:MtqS4neHYs+wE9XD8VBq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4556
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devBBCE.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE
        3⤵
        • Executes dropped EXE
        PID:1932
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devBBCE.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE

    Filesize

    1.7MB

    MD5

    0e458622b587294b3f27585fae69d018

    SHA1

    fdb609bf159a042da5ebbf41a458a9db367a2f35

    SHA256

    ebfc5bc23fb22ec2cbf2f730f498fad5055cc283efcffbfce8afbebd8e01458b

    SHA512

    767775131c747d6956a16aada9f99a28d6811aacae273e36afc17f2a99cd9c2ca7bfd119ac213b1bc31d58f2cfdac226d9d924043e736ee7daccbf8ccfcfd249

  • C:\Users\Admin\AppData\Local\Temp\NEAS.07C31B8C9477C36C80C6A555832B3BE0.EXE

    Filesize

    1.7MB

    MD5

    0e458622b587294b3f27585fae69d018

    SHA1

    fdb609bf159a042da5ebbf41a458a9db367a2f35

    SHA256

    ebfc5bc23fb22ec2cbf2f730f498fad5055cc283efcffbfce8afbebd8e01458b

    SHA512

    767775131c747d6956a16aada9f99a28d6811aacae273e36afc17f2a99cd9c2ca7bfd119ac213b1bc31d58f2cfdac226d9d924043e736ee7daccbf8ccfcfd249

  • C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe

    Filesize

    794KB

    MD5

    c6d0721e9156eb2a40a04bb38be0b2a5

    SHA1

    d0a3fcb3ad9f227a02d30abb767883b42fecc3a7

    SHA256

    2435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d

    SHA512

    e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4

  • C:\Users\Admin\AppData\Local\Temp\NEAS.07c31b8c9477c36c80c6a555832b3be0.exe

    Filesize

    1.7MB

    MD5

    0e458622b587294b3f27585fae69d018

    SHA1

    fdb609bf159a042da5ebbf41a458a9db367a2f35

    SHA256

    ebfc5bc23fb22ec2cbf2f730f498fad5055cc283efcffbfce8afbebd8e01458b

    SHA512

    767775131c747d6956a16aada9f99a28d6811aacae273e36afc17f2a99cd9c2ca7bfd119ac213b1bc31d58f2cfdac226d9d924043e736ee7daccbf8ccfcfd249

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    960KB

    MD5

    808de4b2bfdad481ba9f4e153093b250

    SHA1

    9a9ab72e76755d30978b589c9c2c138c5ba7ec65

    SHA256

    5adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692

    SHA512

    c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab

  • C:\Windows\MSWDM.EXE

    Filesize

    960KB

    MD5

    808de4b2bfdad481ba9f4e153093b250

    SHA1

    9a9ab72e76755d30978b589c9c2c138c5ba7ec65

    SHA256

    5adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692

    SHA512

    c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab

  • C:\Windows\MSWDM.EXE

    Filesize

    960KB

    MD5

    808de4b2bfdad481ba9f4e153093b250

    SHA1

    9a9ab72e76755d30978b589c9c2c138c5ba7ec65

    SHA256

    5adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692

    SHA512

    c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab

  • C:\Windows\MSWDM.EXE

    Filesize

    960KB

    MD5

    808de4b2bfdad481ba9f4e153093b250

    SHA1

    9a9ab72e76755d30978b589c9c2c138c5ba7ec65

    SHA256

    5adfc32f8019e4812149d53c04cb3cfdfb3c98edcc91d5dd57abb26005725692

    SHA512

    c0b3da8df2bcd0d77da2f5a5e1342bd710ad8b35a94b2548f53089b2dbd017954a8ddd714864d0bb2b846b405bc77dda8b3a2d09d61efbc331fff1ac57913dab

  • C:\Windows\devBBCE.tmp

    Filesize

    794KB

    MD5

    c6d0721e9156eb2a40a04bb38be0b2a5

    SHA1

    d0a3fcb3ad9f227a02d30abb767883b42fecc3a7

    SHA256

    2435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d

    SHA512

    e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4

  • memory/2016-9-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2016-23-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4556-24-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4596-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4596-10-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4904-21-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB