Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe
-
Size
216KB
-
MD5
914bc1a57dedeb6c4c28365b41b4c260
-
SHA1
f6bb527f8862fda30bb36b1f3f0125ade1536a6e
-
SHA256
1cc59b4142e6aba697b6416db732ede7f87c1bb76444307b2e0ee4c5af0d598a
-
SHA512
08dcea76115ee2f934283225f51bcaf50b5540bd15b5564197c28b2307f143b8b9cb7c0945904718c29b0585c2afc2f0b2aa8216629ac9dde187edeb115506da
-
SSDEEP
3072:SPUHpiKT2t2UHIu05W7SAFJJOUD9cckiKop97f3r8n9t9YgntwZ:/rTfUHeeSKOS9ccFKk3Y9t9YZZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3696 NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe 3696 NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe 2716 Isass.exe 2716 Isass.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3696 wrote to memory of 2716 3696 NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe 88 PID 3696 wrote to memory of 2716 3696 NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe 88 PID 3696 wrote to memory of 2716 3696 NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.914bc1a57dedeb6c4c28365b41b4c260.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5914bc1a57dedeb6c4c28365b41b4c260
SHA1f6bb527f8862fda30bb36b1f3f0125ade1536a6e
SHA2561cc59b4142e6aba697b6416db732ede7f87c1bb76444307b2e0ee4c5af0d598a
SHA51208dcea76115ee2f934283225f51bcaf50b5540bd15b5564197c28b2307f143b8b9cb7c0945904718c29b0585c2afc2f0b2aa8216629ac9dde187edeb115506da
-
Filesize
216KB
MD5914bc1a57dedeb6c4c28365b41b4c260
SHA1f6bb527f8862fda30bb36b1f3f0125ade1536a6e
SHA2561cc59b4142e6aba697b6416db732ede7f87c1bb76444307b2e0ee4c5af0d598a
SHA51208dcea76115ee2f934283225f51bcaf50b5540bd15b5564197c28b2307f143b8b9cb7c0945904718c29b0585c2afc2f0b2aa8216629ac9dde187edeb115506da
-
Filesize
5.3MB
MD577f087ff8094853916c6c82567d1038e
SHA1ec09d002ba63cd318f88d09dd4b884e66cd0cffc
SHA2560c407d2b505275f685a47dfda7d9c5c0b365fecaeaa0db18e95e8d5fc13ad036
SHA512c9925a308e7d36501909d8f128db416ef9b648d9d8f2e6cd3230fa769dc1b9bb1ef5566482609ea3795fc68c76d78b80e4cee18a7d0913e00fa30e59391fe440