Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
210s -
max time network
227s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe
-
Size
21KB
-
MD5
d4aab7bbe8b9d18ec3da51b3c2d9bf00
-
SHA1
fbd8f48932abf93c5a1ffaccb4e4bcad4c136d7e
-
SHA256
d47ea3c6ce2cafcff7434f5179d2f6100d1b1e1790f492abe73e9bf6d2e47e42
-
SHA512
0e908897ad460018b96cf668af5aba5ad6d5e84624eab100b264f7cc3c140bf4dd91f3693bb08fda15f256ad78c18a7355aff345c9de0fb97865209debdc4560
-
SSDEEP
192:Q54euZSchV1Efj9HjU4uMIKOFkJHwDFIp8zaubYpmc8RhCfL8TsGCc0Spxhw7nmS:I4eyhV+fxqtWiXYpgG5lFqw4gj5Z
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe -
Executes dropped EXE 1 IoCs
pid Process 848 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4632 wrote to memory of 848 4632 NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe 90 PID 4632 wrote to memory of 848 4632 NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe 90 PID 4632 wrote to memory of 848 4632 NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d4aab7bbe8b9d18ec3da51b3c2d9bf00.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5c88aa1fa03fce80c6dcd27f8850697fc
SHA1640b8ed6bf3816ebc79806a54fc0b5666056ae19
SHA256e819f85a671f6dbd6670800aff8c551ef5e0744b8bc0bf8c5f7c36e308115254
SHA512c8110e828e4b9bdbbc02cd80d33676821d62d5fe62935c2118c4745f5311bf8010caa47cce1b019155fd2cb1df0bc8d2ef70af9fbd80986921c664deca979e72
-
Filesize
21KB
MD5c88aa1fa03fce80c6dcd27f8850697fc
SHA1640b8ed6bf3816ebc79806a54fc0b5666056ae19
SHA256e819f85a671f6dbd6670800aff8c551ef5e0744b8bc0bf8c5f7c36e308115254
SHA512c8110e828e4b9bdbbc02cd80d33676821d62d5fe62935c2118c4745f5311bf8010caa47cce1b019155fd2cb1df0bc8d2ef70af9fbd80986921c664deca979e72
-
Filesize
21KB
MD5c88aa1fa03fce80c6dcd27f8850697fc
SHA1640b8ed6bf3816ebc79806a54fc0b5666056ae19
SHA256e819f85a671f6dbd6670800aff8c551ef5e0744b8bc0bf8c5f7c36e308115254
SHA512c8110e828e4b9bdbbc02cd80d33676821d62d5fe62935c2118c4745f5311bf8010caa47cce1b019155fd2cb1df0bc8d2ef70af9fbd80986921c664deca979e72