Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fa35b2daeea4893c39c7757406645af0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.fa35b2daeea4893c39c7757406645af0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.fa35b2daeea4893c39c7757406645af0.exe
-
Size
473KB
-
MD5
fa35b2daeea4893c39c7757406645af0
-
SHA1
5a4db2dfa8b4065ec4a07eac157d9d0b9c6609a7
-
SHA256
8ef16d53048177e8d3084bb8bbc4c1f7f291b56d25e15f6523aab7712805856e
-
SHA512
a24a57ea24a1751bed2186c267190ecc18feefed2419a94566d7839b8034fa6fe9c695a4b0de7bbf73bb6486d857eb61016733f2cca93238dd305bee7f23edf1
-
SSDEEP
1536:ur3Z5IfQmv81a1xyXHZ+NGQSLNmCm6oyz7jBd7qDmbNPMJAVC+++6:yJOfQm01mxyXHZKG7pm6j77C
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 812 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation NEAS.fa35b2daeea4893c39c7757406645af0.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 pwshost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\pwshost.exe NEAS.fa35b2daeea4893c39c7757406645af0.exe File opened for modification C:\Windows\Debug\pwshost.exe NEAS.fa35b2daeea4893c39c7757406645af0.exe File opened for modification C:\Windows\Debug\pwshost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3380 NEAS.fa35b2daeea4893c39c7757406645af0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3380 wrote to memory of 812 3380 NEAS.fa35b2daeea4893c39c7757406645af0.exe 88 PID 3380 wrote to memory of 812 3380 NEAS.fa35b2daeea4893c39c7757406645af0.exe 88 PID 3380 wrote to memory of 812 3380 NEAS.fa35b2daeea4893c39c7757406645af0.exe 88 PID 3380 wrote to memory of 3876 3380 NEAS.fa35b2daeea4893c39c7757406645af0.exe 91 PID 3380 wrote to memory of 3876 3380 NEAS.fa35b2daeea4893c39c7757406645af0.exe 91 PID 3380 wrote to memory of 3876 3380 NEAS.fa35b2daeea4893c39c7757406645af0.exe 91 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 812 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fa35b2daeea4893c39c7757406645af0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fa35b2daeea4893c39c7757406645af0.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\pwshost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEASFA~1.EXE > nul2⤵PID:3876
-
-
C:\Windows\Debug\pwshost.exeC:\Windows\Debug\pwshost.exe1⤵
- Executes dropped EXE
PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
473KB
MD5b56cf7e1c611d6abc2cd691891485079
SHA192ddb49553e80df8b0ffa685d486cc6fa248b6bb
SHA256b2f1a61380bfa882bdc1d568efd240a31d796abe3ef1b6e032716049b8b48398
SHA51285edff22fdace69ceade7baa31f89a3fad06285860a98215b437fcf24e1a55f096088c224621aa0b632f9869df227d1ef5af4e0e0d2449a97c1294d86d808fe4
-
Filesize
473KB
MD5b56cf7e1c611d6abc2cd691891485079
SHA192ddb49553e80df8b0ffa685d486cc6fa248b6bb
SHA256b2f1a61380bfa882bdc1d568efd240a31d796abe3ef1b6e032716049b8b48398
SHA51285edff22fdace69ceade7baa31f89a3fad06285860a98215b437fcf24e1a55f096088c224621aa0b632f9869df227d1ef5af4e0e0d2449a97c1294d86d808fe4