Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
169s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe
-
Size
458KB
-
MD5
279fca2fb9903b7be96c3cadc7ef3a50
-
SHA1
e169f06c121656afcd28fbe0f90cd4565fc31c27
-
SHA256
f2a3a9f378db287bdd6aeb8c68e8e6dbb4c544d01a7e48ce58f4c9f29b5e4b7b
-
SHA512
c500b449dee51f63d1fe621987e4bd69e0e6718f07ede27ec13f1d562719819b4f5d58ed6be6c8ee2e2a4e2d0a86b9e0464c9d3c592933d3e83f61eb892654df
-
SSDEEP
6144:/pW2bgbbV28okoS1oWMkdlZQ5iioct0IwdNOuLcktJFksISWmSILKxrj:/pW2IoioS6jsk
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe BATCF %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe NTPAD %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe BATCF %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe CMDSF %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\giffile\shell\Open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe JPGIF %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe NTPAD %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe NTPAD %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe VBSSF %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe HTMWF %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\rtffile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe RTFDF %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\Open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe NTPAD %1" NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 4776 reg.exe 5040 reg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4776 4264 NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe 93 PID 4264 wrote to memory of 4776 4264 NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe 93 PID 4264 wrote to memory of 5040 4264 NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe 94 PID 4264 wrote to memory of 5040 4264 NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.279fca2fb9903b7be96c3cadc7ef3a50.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- UAC bypass
- Modifies registry key
PID:4776
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:5040
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD538112246f923effc0248089d1526aeca
SHA1362d3ce055c040355b51e42a0da0e54b3aac9a69
SHA25621025a54f6b2afd3abc7cd18b819ed48823fc33ef7c20f22b568e8d0af7811ac
SHA512b71c7208d8bf5f27264698caa79aaff1434fdd6d3bf534557ce91dee12fc7e5d150aa9c759b56bdb9420ef3f044e5fd3a10e7845868b14aeaa051d2713f16629