Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe
-
Size
393KB
-
MD5
ea8cbde2a13a3fdcb31ade83e7498510
-
SHA1
7130588684c87d29cbd9bf25cd8823f69dda5e2e
-
SHA256
e75de707168383230955693f4d7079f1099cf520d27bcba20d3226c9554e18ef
-
SHA512
5e89460e76edf59a55e11815692917fc5caf32e4adae92bbd5cedf3666e9a14f1ae8f651860adefda2b0f14084897588b2b25c80c75334ec9858ecb612bee194
-
SSDEEP
6144:gs833CnotE7RN8JmrwW9NaZIGBQLBYUSWO7F3vZeSRlaYy/hO3s:mLtE7RaflQL6UfMMd/hes
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System-Service = "C:\\Windows\\SYSTEM\\EXPLORER.SCR" NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SYSTEM\EXPLORER.SCR NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe File opened for modification C:\Windows\SYSTEM\EXPLORER.SCR NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31067302" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{73D60E7A-7899-11EE-92AA-661969C3BEB8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1058065713" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31067302" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1058065713" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3468 iexplore.exe 3468 iexplore.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3984 wrote to memory of 3468 3984 NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe 105 PID 3984 wrote to memory of 3468 3984 NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe 105 PID 3468 wrote to memory of 3880 3468 iexplore.exe 108 PID 3468 wrote to memory of 3880 3468 iexplore.exe 108 PID 3468 wrote to memory of 3880 3468 iexplore.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ea8cbde2a13a3fdcb31ade83e7498510_JC.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://img.sedoparking.com/images/js_preloader.gif?cod=000ACA449590008BDD5AAC&user=err&shared=02⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3468 CREDAT:17410 /prefetch:23⤵PID:3880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD5fcb927b3ff74c54068f8ad07a27396fc
SHA19070644490125971aba968932f3e43c0d05cecf8
SHA25659c21fa040cc4c7a064a15d1150135ee67c7e8fa515da835db4f109d81030819
SHA512349e9843e77b217d2886558fff1d812f57ecb795726781be32bde7f26f29c494380e03cca24e7daa5059c5e9bf2ba56d20b12662a8cd78ae059f33d286128dad