Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 14:12

General

  • Target

    NEAS.76c625b70730c66be38715ed3d5778e0.exe

  • Size

    2.4MB

  • MD5

    76c625b70730c66be38715ed3d5778e0

  • SHA1

    3184c2b9bac6f8013e211021e1ba0b54a26852a7

  • SHA256

    6d6ef77389142cbd7f052270f417cdb703f0872d48e4625483f252c47707e2de

  • SHA512

    62c11bbec851cc481ab4dd3f25b6354822b0792ad1353c5b2d3f2e99214938811d4645eb11a2434cfba480b484ea85067a9106e11f0cc9fcbe3de33672bc76f2

  • SSDEEP

    49152:L3KoBQxG9i9w4QclMHG/m9FBiC1y/uUNxff0vhtAFE9P/qX/S+:L3KkQMcNQlHG/oF8aUz0vnx9C

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Program Files directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.76c625b70730c66be38715ed3d5778e0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.76c625b70730c66be38715ed3d5778e0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    PID:1592
  • C:\PROGRA~3\Mozilla\asqmzyj.exe
    C:\PROGRA~3\Mozilla\asqmzyj.exe -kewnvcd
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    PID:3532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\asqmzyj.exe

    Filesize

    2.4MB

    MD5

    7634dad0df102fe6795e6e8a2d938787

    SHA1

    30fedab04eef49c09b757feb8a9db751f0330448

    SHA256

    38201545b41a6a2843239df668b3fcdbcec801673f722b4b6104ce4b2055cb49

    SHA512

    21c61f136074289a23865cff6ce517996276aec18e8d4d73b281cdf5f3962c6cdb09346a102ed29f2594abfb8500a417b66b207399b564bde89055e731067179

  • C:\ProgramData\Mozilla\asqmzyj.exe

    Filesize

    2.4MB

    MD5

    7634dad0df102fe6795e6e8a2d938787

    SHA1

    30fedab04eef49c09b757feb8a9db751f0330448

    SHA256

    38201545b41a6a2843239df668b3fcdbcec801673f722b4b6104ce4b2055cb49

    SHA512

    21c61f136074289a23865cff6ce517996276aec18e8d4d73b281cdf5f3962c6cdb09346a102ed29f2594abfb8500a417b66b207399b564bde89055e731067179

  • memory/1592-0-0x0000000000400000-0x0000000000A91000-memory.dmp

    Filesize

    6.6MB

  • memory/1592-1-0x0000000002D00000-0x0000000002D5B000-memory.dmp

    Filesize

    364KB

  • memory/1592-2-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1592-4-0x0000000000400000-0x0000000000A91000-memory.dmp

    Filesize

    6.6MB

  • memory/1592-5-0x0000000002D00000-0x0000000002D5B000-memory.dmp

    Filesize

    364KB

  • memory/1592-7-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1592-9-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3532-12-0x0000000001430000-0x000000000148B000-memory.dmp

    Filesize

    364KB