Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2023, 20:39

General

  • Target

    NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe

  • Size

    209KB

  • MD5

    33a50541a2ca052a61cd4cc6aff62af0

  • SHA1

    5a92a09bacff8015cc47a5d62b1a0b898b818910

  • SHA256

    72e40cac0281190ba5104c1257c374f0d523636a84d6cade22ae05bcf72955da

  • SHA512

    961c8dba613b8ebb4402555032c4e7d2ba2d3243fb3b3950a8b06aeb3f98e2dbaa4404a3f16992afe2256e83455125339bc36a0db409c75647fdc2666c8610ee

  • SSDEEP

    3072:qlmtZSkhslvxNnn9w4ZKktgsKAbt2OGXhqqyRxzmbcSXQL9w+jNtIVYwkKsbTsv8:qlsSFhznn9drxbtGxsVL9w+zp/l

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\441.tmp\vir.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save NEAS.33a50541a2ca052a61cd4cc6aff62af0_JC.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Users\Admin\AppData\Local\Temp\858.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\858.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe888.tmp"
          4⤵
          • Executes dropped EXE
          PID:2456
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
        • Modifies registry class
        PID:2156
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
        • Modifies registry class
        PID:4812
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2996
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\441.tmp\vir.bat

    Filesize

    1KB

    MD5

    a74597aa3607d89f849c990d0bb7f437

    SHA1

    03acb289aeca09d9388459c0936ae50d2ec213f7

    SHA256

    474afd74bd35ce24f3444bb713d738a5d22964ace3baa55342bc96e9c2ab5b48

    SHA512

    e399738cb145c82962002fb045891f3bebf7ffe26a01d8f29da98d77837ab44f2fc7a1aa6d2a8f98d3bd2221520f2bce1dbe92a93a113e9a3d6b383c8302aa84

  • C:\Users\Admin\AppData\Local\Temp\858.tmp\mpress.exe

    Filesize

    100KB

    MD5

    e42b81b9636152c78ba480c1c47d3c7f

    SHA1

    66a2fca3925428ee91ad9df5b76b90b34d28e0f8

    SHA256

    7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

    SHA512

    4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

  • C:\Users\Admin\AppData\Local\Temp\858.tmp\mpress.exe

    Filesize

    100KB

    MD5

    e42b81b9636152c78ba480c1c47d3c7f

    SHA1

    66a2fca3925428ee91ad9df5b76b90b34d28e0f8

    SHA256

    7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

    SHA512

    4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

  • C:\Users\Admin\AppData\Local\Temp\exe888.tmp

    Filesize

    41KB

    MD5

    ebcc0f877b80fa4157b2f780c6863c50

    SHA1

    e9bc8f799887a43ef7445bf39124075a2baf1b3c

    SHA256

    9053aa322aa1443a79c4ef7b1447f92d05c9d3c023902ef4de3abaaccdc6df01

    SHA512

    7d000c34f9de9c41cef651f3e681f97b147a251de69ecbc3743e437f97ce10cc33d1f3d5fc45c10d1b75bac3de5b86ff8ae50bb629fafb34bbf0a4c5593aa945

  • C:\Users\Admin\AppData\Local\Temp\exe888.tmp

    Filesize

    741KB

    MD5

    d019122cf6b255b3fa00163eba1f9023

    SHA1

    6d9ff19a46e0c20fc3972a39a25b19236de307c4

    SHA256

    743f6c6ce86c199b39d3ff0b484c66ebc9b9b69c970580de1d6ff07111337aac

    SHA512

    1167a8b5f90e9cf49bb52710eb1dc78bcae32091d2c6b60a88ae9bdf2bc045df1707f119f5fb6fd799f0a914f747412744129753c4578d351040fc2f68e71b62

  • C:\Users\Admin\AppData\Local\Temp\exe888.tmp

    Filesize

    741KB

    MD5

    d019122cf6b255b3fa00163eba1f9023

    SHA1

    6d9ff19a46e0c20fc3972a39a25b19236de307c4

    SHA256

    743f6c6ce86c199b39d3ff0b484c66ebc9b9b69c970580de1d6ff07111337aac

    SHA512

    1167a8b5f90e9cf49bb52710eb1dc78bcae32091d2c6b60a88ae9bdf2bc045df1707f119f5fb6fd799f0a914f747412744129753c4578d351040fc2f68e71b62

  • C:\Users\Admin\AppData\Local\Temp\exe888.tmp

    Filesize

    207KB

    MD5

    4ef5df4279d3bcb33a5710823e845c40

    SHA1

    aeab1e44c9735cee7c2356dc8284348710b75b1d

    SHA256

    8ec64c8bc9770a47b0c5ded390907cb5589188bfe012a81e4d573092bb158369

    SHA512

    dc0010d4e483350e16b497b0064749aa8e7e51e8c4886c2033e6f40af6dd9115691e12f35c335e8365c61696ff8a2bb683b8064332f4457ea69a51bc425802a9

  • C:\Users\Admin\AppData\Local\Temp\mprE24.tmp

    Filesize

    207KB

    MD5

    4ef5df4279d3bcb33a5710823e845c40

    SHA1

    aeab1e44c9735cee7c2356dc8284348710b75b1d

    SHA256

    8ec64c8bc9770a47b0c5ded390907cb5589188bfe012a81e4d573092bb158369

    SHA512

    dc0010d4e483350e16b497b0064749aa8e7e51e8c4886c2033e6f40af6dd9115691e12f35c335e8365c61696ff8a2bb683b8064332f4457ea69a51bc425802a9

  • C:\Users\Admin\AppData\Local\Temp\s.dll

    Filesize

    700KB

    MD5

    77ba6153827a203577b5d79c941e801c

    SHA1

    6deb4bdee67f4fb1a01ffa702e7941220c00f5a0

    SHA256

    7df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7

    SHA512

    65d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2

  • C:\Users\Admin\AppData\Local\Temp\u.dll

    Filesize

    700KB

    MD5

    77ba6153827a203577b5d79c941e801c

    SHA1

    6deb4bdee67f4fb1a01ffa702e7941220c00f5a0

    SHA256

    7df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7

    SHA512

    65d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2

  • C:\Users\Admin\AppData\Local\Temp\u.dll

    Filesize

    700KB

    MD5

    77ba6153827a203577b5d79c941e801c

    SHA1

    6deb4bdee67f4fb1a01ffa702e7941220c00f5a0

    SHA256

    7df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7

    SHA512

    65d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2

  • C:\Users\Admin\AppData\Local\Temp\u.dll

    Filesize

    700KB

    MD5

    77ba6153827a203577b5d79c941e801c

    SHA1

    6deb4bdee67f4fb1a01ffa702e7941220c00f5a0

    SHA256

    7df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7

    SHA512

    65d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2

  • C:\Users\Admin\AppData\Local\Temp\vir.bat

    Filesize

    1KB

    MD5

    598941c8566055aabccfbec31a9c0f31

    SHA1

    630b75880ed9e405d01157e92b3b640806cb59b9

    SHA256

    cec25f746b81af80c58e8f51fc5c55988092b39ba4f6471957813a4679f5648a

    SHA512

    73e13d39adb8b8daa10d2354be14b3dbc4f02596b8440ff464f5c169cf0b32f6b8ee7be0a608ea11089ec75e4f34368415e8225ac4f5ff9793689243e45fc93d

  • memory/2456-53-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2456-61-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4884-1-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/4884-0-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/4884-69-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB