Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    210s
  • max time network
    227s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 14:21

General

  • Target

    NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe

  • Size

    21KB

  • MD5

    d4aab7bbe8b9d18ec3da51b3c2d9bf00

  • SHA1

    fbd8f48932abf93c5a1ffaccb4e4bcad4c136d7e

  • SHA256

    d47ea3c6ce2cafcff7434f5179d2f6100d1b1e1790f492abe73e9bf6d2e47e42

  • SHA512

    0e908897ad460018b96cf668af5aba5ad6d5e84624eab100b264f7cc3c140bf4dd91f3693bb08fda15f256ad78c18a7355aff345c9de0fb97865209debdc4560

  • SSDEEP

    192:Q54euZSchV1Efj9HjU4uMIKOFkJHwDFIp8zaubYpmc8RhCfL8TsGCc0Spxhw7nmS:I4eyhV+fxqtWiXYpgG5lFqw4gj5Z

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    21KB

    MD5

    c88aa1fa03fce80c6dcd27f8850697fc

    SHA1

    640b8ed6bf3816ebc79806a54fc0b5666056ae19

    SHA256

    e819f85a671f6dbd6670800aff8c551ef5e0744b8bc0bf8c5f7c36e308115254

    SHA512

    c8110e828e4b9bdbbc02cd80d33676821d62d5fe62935c2118c4745f5311bf8010caa47cce1b019155fd2cb1df0bc8d2ef70af9fbd80986921c664deca979e72

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    21KB

    MD5

    c88aa1fa03fce80c6dcd27f8850697fc

    SHA1

    640b8ed6bf3816ebc79806a54fc0b5666056ae19

    SHA256

    e819f85a671f6dbd6670800aff8c551ef5e0744b8bc0bf8c5f7c36e308115254

    SHA512

    c8110e828e4b9bdbbc02cd80d33676821d62d5fe62935c2118c4745f5311bf8010caa47cce1b019155fd2cb1df0bc8d2ef70af9fbd80986921c664deca979e72

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    21KB

    MD5

    c88aa1fa03fce80c6dcd27f8850697fc

    SHA1

    640b8ed6bf3816ebc79806a54fc0b5666056ae19

    SHA256

    e819f85a671f6dbd6670800aff8c551ef5e0744b8bc0bf8c5f7c36e308115254

    SHA512

    c8110e828e4b9bdbbc02cd80d33676821d62d5fe62935c2118c4745f5311bf8010caa47cce1b019155fd2cb1df0bc8d2ef70af9fbd80986921c664deca979e72

  • memory/848-15-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/848-16-0x00000000024D0000-0x00000000028D0000-memory.dmp

    Filesize

    4.0MB

  • memory/848-19-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4632-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4632-1-0x00000000021B0000-0x00000000021B1000-memory.dmp

    Filesize

    4KB

  • memory/4632-3-0x0000000002560000-0x0000000002960000-memory.dmp

    Filesize

    4.0MB

  • memory/4632-4-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB