Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe
-
Size
209KB
-
MD5
33a50541a2ca052a61cd4cc6aff62af0
-
SHA1
5a92a09bacff8015cc47a5d62b1a0b898b818910
-
SHA256
72e40cac0281190ba5104c1257c374f0d523636a84d6cade22ae05bcf72955da
-
SHA512
961c8dba613b8ebb4402555032c4e7d2ba2d3243fb3b3950a8b06aeb3f98e2dbaa4404a3f16992afe2256e83455125339bc36a0db409c75647fdc2666c8610ee
-
SSDEEP
3072:qlmtZSkhslvxNnn9w4ZKktgsKAbt2OGXhqqyRxzmbcSXQL9w+jNtIVYwkKsbTsv8:qlsSFhznn9drxbtGxsVL9w+zp/l
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2124 u.dll 2456 mpress.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2996 OpenWith.exe 1752 OpenWith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4884 wrote to memory of 1936 4884 NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe 93 PID 4884 wrote to memory of 1936 4884 NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe 93 PID 4884 wrote to memory of 1936 4884 NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe 93 PID 1936 wrote to memory of 2124 1936 cmd.exe 95 PID 1936 wrote to memory of 2124 1936 cmd.exe 95 PID 1936 wrote to memory of 2124 1936 cmd.exe 95 PID 2124 wrote to memory of 2456 2124 u.dll 96 PID 2124 wrote to memory of 2456 2124 u.dll 96 PID 2124 wrote to memory of 2456 2124 u.dll 96 PID 1936 wrote to memory of 2156 1936 cmd.exe 97 PID 1936 wrote to memory of 2156 1936 cmd.exe 97 PID 1936 wrote to memory of 2156 1936 cmd.exe 97 PID 1936 wrote to memory of 4812 1936 cmd.exe 101 PID 1936 wrote to memory of 4812 1936 cmd.exe 101 PID 1936 wrote to memory of 4812 1936 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\441.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\858.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\858.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe888.tmp"4⤵
- Executes dropped EXE
PID:2456
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:2156
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:4812
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2996
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1752
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a74597aa3607d89f849c990d0bb7f437
SHA103acb289aeca09d9388459c0936ae50d2ec213f7
SHA256474afd74bd35ce24f3444bb713d738a5d22964ace3baa55342bc96e9c2ab5b48
SHA512e399738cb145c82962002fb045891f3bebf7ffe26a01d8f29da98d77837ab44f2fc7a1aa6d2a8f98d3bd2221520f2bce1dbe92a93a113e9a3d6b383c8302aa84
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD5ebcc0f877b80fa4157b2f780c6863c50
SHA1e9bc8f799887a43ef7445bf39124075a2baf1b3c
SHA2569053aa322aa1443a79c4ef7b1447f92d05c9d3c023902ef4de3abaaccdc6df01
SHA5127d000c34f9de9c41cef651f3e681f97b147a251de69ecbc3743e437f97ce10cc33d1f3d5fc45c10d1b75bac3de5b86ff8ae50bb629fafb34bbf0a4c5593aa945
-
Filesize
741KB
MD5d019122cf6b255b3fa00163eba1f9023
SHA16d9ff19a46e0c20fc3972a39a25b19236de307c4
SHA256743f6c6ce86c199b39d3ff0b484c66ebc9b9b69c970580de1d6ff07111337aac
SHA5121167a8b5f90e9cf49bb52710eb1dc78bcae32091d2c6b60a88ae9bdf2bc045df1707f119f5fb6fd799f0a914f747412744129753c4578d351040fc2f68e71b62
-
Filesize
741KB
MD5d019122cf6b255b3fa00163eba1f9023
SHA16d9ff19a46e0c20fc3972a39a25b19236de307c4
SHA256743f6c6ce86c199b39d3ff0b484c66ebc9b9b69c970580de1d6ff07111337aac
SHA5121167a8b5f90e9cf49bb52710eb1dc78bcae32091d2c6b60a88ae9bdf2bc045df1707f119f5fb6fd799f0a914f747412744129753c4578d351040fc2f68e71b62
-
Filesize
207KB
MD54ef5df4279d3bcb33a5710823e845c40
SHA1aeab1e44c9735cee7c2356dc8284348710b75b1d
SHA2568ec64c8bc9770a47b0c5ded390907cb5589188bfe012a81e4d573092bb158369
SHA512dc0010d4e483350e16b497b0064749aa8e7e51e8c4886c2033e6f40af6dd9115691e12f35c335e8365c61696ff8a2bb683b8064332f4457ea69a51bc425802a9
-
Filesize
207KB
MD54ef5df4279d3bcb33a5710823e845c40
SHA1aeab1e44c9735cee7c2356dc8284348710b75b1d
SHA2568ec64c8bc9770a47b0c5ded390907cb5589188bfe012a81e4d573092bb158369
SHA512dc0010d4e483350e16b497b0064749aa8e7e51e8c4886c2033e6f40af6dd9115691e12f35c335e8365c61696ff8a2bb683b8064332f4457ea69a51bc425802a9
-
Filesize
700KB
MD577ba6153827a203577b5d79c941e801c
SHA16deb4bdee67f4fb1a01ffa702e7941220c00f5a0
SHA2567df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7
SHA51265d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2
-
Filesize
700KB
MD577ba6153827a203577b5d79c941e801c
SHA16deb4bdee67f4fb1a01ffa702e7941220c00f5a0
SHA2567df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7
SHA51265d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2
-
Filesize
700KB
MD577ba6153827a203577b5d79c941e801c
SHA16deb4bdee67f4fb1a01ffa702e7941220c00f5a0
SHA2567df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7
SHA51265d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2
-
Filesize
700KB
MD577ba6153827a203577b5d79c941e801c
SHA16deb4bdee67f4fb1a01ffa702e7941220c00f5a0
SHA2567df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7
SHA51265d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2
-
Filesize
1KB
MD5598941c8566055aabccfbec31a9c0f31
SHA1630b75880ed9e405d01157e92b3b640806cb59b9
SHA256cec25f746b81af80c58e8f51fc5c55988092b39ba4f6471957813a4679f5648a
SHA51273e13d39adb8b8daa10d2354be14b3dbc4f02596b8440ff464f5c169cf0b32f6b8ee7be0a608ea11089ec75e4f34368415e8225ac4f5ff9793689243e45fc93d