Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 08:40
Behavioral task
behavioral1
Sample
NEAS.e835ad0336010eb70597f151b8bd2248.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.e835ad0336010eb70597f151b8bd2248.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.e835ad0336010eb70597f151b8bd2248.exe
-
Size
29KB
-
MD5
e835ad0336010eb70597f151b8bd2248
-
SHA1
cae05997d7d4793f28f844584530eb64dafae859
-
SHA256
1d8308b12e7ea9672e61e2a3ea56575d743d971fdb1c0eb8f73bce86e1c10b0f
-
SHA512
ba95d8512396fa13cdd4fdda4662408b8cb9eeede57b52d611bd556d73c0a7dcc7f53a7054bdf4dba3b90d14e5f91563ce8cea80b64dfbc933940f789173c059
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/8T:AEwVs+0jNDY1qi/q+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2944 services.exe -
resource yara_rule behavioral2/memory/1584-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0006000000022e6b-4.dat upx behavioral2/memory/2944-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0006000000022e6b-7.dat upx behavioral2/memory/1584-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2944-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2944-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2944-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2944-25-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2944-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2944-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2944-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0009000000022e8a-48.dat upx behavioral2/memory/2944-56-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1584-104-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2944-111-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1584-144-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2944-164-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1584-205-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2944-209-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1584-233-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2944-238-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1584-276-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2944-284-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1584-327-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2944-332-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1584-373-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2944-375-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" NEAS.e835ad0336010eb70597f151b8bd2248.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe NEAS.e835ad0336010eb70597f151b8bd2248.exe File opened for modification C:\Windows\java.exe NEAS.e835ad0336010eb70597f151b8bd2248.exe File created C:\Windows\java.exe NEAS.e835ad0336010eb70597f151b8bd2248.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1584 wrote to memory of 2944 1584 NEAS.e835ad0336010eb70597f151b8bd2248.exe 89 PID 1584 wrote to memory of 2944 1584 NEAS.e835ad0336010eb70597f151b8bd2248.exe 89 PID 1584 wrote to memory of 2944 1584 NEAS.e835ad0336010eb70597f151b8bd2248.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e835ad0336010eb70597f151b8bd2248.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e835ad0336010eb70597f151b8bd2248.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305B
MD5f84538b33a071d01320a46b057aef921
SHA1e7b43145855c43f8c5d43a9b39e707885c17294e
SHA256e5a764c9c517f97e07ee2c8e1296e5f68ef436ea513eefb639fc40dffac6e1fc
SHA512eff4fdc3ad9ba8f40b99b3e4f856546b5f2b17d0e715f4529a0c7f9e3150964a2b1625c0f734b643ff4496cfd9d256aa096c7e2c4e1911e6262dc9fd869dca5a
-
Filesize
303B
MD50a53779b07f9c9c56ef169499851915e
SHA1281bf81610dae812be159f95a0858f88f9b96637
SHA256b946117d346ecf850135aae1ac65b368f4effd806bf5180ecd3c585f1324dbd1
SHA5125a5016dcdeef68be7115eafee0a6844e3cc868fa04f353980d924fca7394962d919d8dece40b15b7ddcc867f956fc8c0e522b68688ca409f1671c39e42973dc6
-
Filesize
308B
MD5d633d65c70fce887db4580e12d24dda5
SHA18e37901eb72c58f96990f30fe13bb1dcb22874e8
SHA256358883157b84d0634a7a4cabb66dbd4d22f57db6526a8563dfa0748b122ef76b
SHA512357938278bfd73b7be94e286ee09730ffedf00be87a175e93a9bb25a8570caa79b8cbfb468c86d96d262fb31dbfba9f3b58aa134887752e8a4185f23cd2d5bae
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
303B
MD56a62ed00d5950a7aa3df6d446d0beb92
SHA1608da2a7b63e92b731a7beb2d990405d7a6e9611
SHA2567aaaf31ea9c2999c775008a4b769336c91d87dc8f6dc0a1015bb45c61bc39fdb
SHA51210a77d30bd2a5a930233e79830ac6e0a695bcfacb4e33fe9a67a7dc4b4c0ffaf3ca6ce458bf2a6714b9c590997ff816f207bee87536516a2c8e711c3c161773d
-
Filesize
304B
MD53483bf8f41c9a3b9c4acd2c9be5d8d00
SHA1fe960cf9b9744217b295ed86f66e80c58c4d6052
SHA2569b402b64c9cddf2ce4c139df23fd6354b51bb218706076d0b6ed1c128df25535
SHA5121df7f496dcd70238c3982e595964b552548a7100f3b238a65476cc57fb10e3e1d82c19ffc3f4d61ead29657623665126f3e09561bc0feb39f3aa189f603757db
-
Filesize
305B
MD52c4ce699b73ce3278646321d836aca40
SHA172ead77fbd91cfadae8914cbb4c023a618bf0bd1
SHA256e7391b33aeb3be8afbe1b180430c606c5d3368baf7f458254cef5db9eef966e3
SHA51289ec604cd4a4ad37c5392da0bb28bd9072d731a3efdd38707eeb7b1caf7626e6917da687529bf9426d8eb89fab23175399032d545d96ab93ffd19dd54c02c075
-
Filesize
314B
MD5b07e581a2a8817ceb6f3fd2201ab1f88
SHA15821cfcbe8fd4902e273deae671e19d224122f75
SHA2560e035ede0ac6c36ce4995f1c04d5ae235e43e17ebe25008896349bbf70c46616
SHA51260d45ccf6586f812aaad3c501682be0002b22fe9c395ede044d17ec9392d55a940d852ef546fd2f84edb1eab73fe4424ad6b4ca67befef32360ed8d73bedfe08
-
Filesize
29KB
MD51c956145f5fc477aa5d31c668849d8f3
SHA16047a306757de36504647433c897f0243ee435c9
SHA25643fe848130961e578b356f1e2d29dc8f8b2bd705a0f15ee5a7895e9e016cd753
SHA5125bf25647e51a925f013315194552f372c348313cdcb2e1ce749a035e6dd699a9d45785c9632beb3ff324ac84860962266d54bb96823f5b34a481ebbe88fa6a77
-
Filesize
320B
MD55f9549bea3a806ad73347c7e5e64d913
SHA1a79257015c04e7329ee5e262c6355664f4fd4f80
SHA2562dee909b1c726e86f32f696e0e651304f8aa8bf2de543eeb0bf88fc90a3e1ee3
SHA5121a3f33c276ec5880cfa1c238f68f56ab9c951797e2446109cb4486f38d1aef3df6fdbf0a330b74183e82b6397c3c73ae9d390e9d3e438b3e0fdd9912be1e39ae
-
Filesize
320B
MD5c4a14462b6d077c121047c359c154d5c
SHA19a3db87e92da3fdd7ff43978b3f56b40783881d5
SHA256c4f36b55eca69ece8ddbd5a66b81232235457bfe1fbf983c58fe981c4ea86b23
SHA512dd44b4a1e9eab49aa92503bcbb712d83c59d1f1fd0237e9917090e04680e7622a1d31db2a79a12e5aa3dafd45d7e8f140a5c76875eff0780fa8ad25ada03d0ab
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2