Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f5aafa02d6a8b9f2cafe2e38714241f0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.f5aafa02d6a8b9f2cafe2e38714241f0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.f5aafa02d6a8b9f2cafe2e38714241f0.exe
-
Size
37KB
-
MD5
f5aafa02d6a8b9f2cafe2e38714241f0
-
SHA1
4da9cab27ff9d08a31f03df9417c3c9eec9ca9df
-
SHA256
1e9595a0662d184ced635e2d88b2d952175010d0b3bd1232efafe4d754eb2da4
-
SHA512
99254e08f14fd870b89514c66fe7b8dd68a791ac67e8fd9c8a7f4fa5e896332d88c18d2f483345acb47a34bd3fda1dfbdc5cccd4f692bbc2c5da1e386d302537
-
SSDEEP
768:7qP0V5P1wD0CbS0HaUpJVuq9Jzo78x+pu9fWWq53E7l0nX:720V7wdS0P79Jc78x+pu9fWWq539
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation NEAS.f5aafa02d6a8b9f2cafe2e38714241f0.exe -
Executes dropped EXE 1 IoCs
pid Process 1336 wefujn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1336 1948 NEAS.f5aafa02d6a8b9f2cafe2e38714241f0.exe 90 PID 1948 wrote to memory of 1336 1948 NEAS.f5aafa02d6a8b9f2cafe2e38714241f0.exe 90 PID 1948 wrote to memory of 1336 1948 NEAS.f5aafa02d6a8b9f2cafe2e38714241f0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f5aafa02d6a8b9f2cafe2e38714241f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f5aafa02d6a8b9f2cafe2e38714241f0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\wefujn.exe"C:\Users\Admin\AppData\Local\Temp\wefujn.exe"2⤵
- Executes dropped EXE
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5d14150fbba5cfe42c25870d6c83c1398
SHA160ab45d9e4ce037485c871ec1181c2ee253b49b6
SHA25614767a08bd6b04337ae2c69ba809b4be4f3d663261bc9a290ff97d3a7c41dd50
SHA51250bf37c19b6222a03c4e97b0bf012b02dd41e0d40874f595af35105d38f517d30675bcbe12daa682135f971c220d969da2b87ea048a63b7f903a611af775b2d6
-
Filesize
37KB
MD5d14150fbba5cfe42c25870d6c83c1398
SHA160ab45d9e4ce037485c871ec1181c2ee253b49b6
SHA25614767a08bd6b04337ae2c69ba809b4be4f3d663261bc9a290ff97d3a7c41dd50
SHA51250bf37c19b6222a03c4e97b0bf012b02dd41e0d40874f595af35105d38f517d30675bcbe12daa682135f971c220d969da2b87ea048a63b7f903a611af775b2d6
-
Filesize
37KB
MD5d14150fbba5cfe42c25870d6c83c1398
SHA160ab45d9e4ce037485c871ec1181c2ee253b49b6
SHA25614767a08bd6b04337ae2c69ba809b4be4f3d663261bc9a290ff97d3a7c41dd50
SHA51250bf37c19b6222a03c4e97b0bf012b02dd41e0d40874f595af35105d38f517d30675bcbe12daa682135f971c220d969da2b87ea048a63b7f903a611af775b2d6