Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 14:22
Behavioral task
behavioral1
Sample
NEAS.e246850a5f88ca3e91d39775c778a4d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e246850a5f88ca3e91d39775c778a4d0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.e246850a5f88ca3e91d39775c778a4d0.exe
-
Size
3.8MB
-
MD5
e246850a5f88ca3e91d39775c778a4d0
-
SHA1
6bdab39b185fa5cfa0afcda19e4270523e68cc54
-
SHA256
6a6b4a8cee6456f96d0c4105ebe0c630a29e8c095d2113f5d46e6564ebc9efbe
-
SHA512
7afcdea07f761bea36a02af4d8bcaaccbd2ee913974f6c864055858a379d84ff76723a24b32a4ff4740b46d561c5c5829b620e2f035cd586d66971a2e63d41cd
-
SSDEEP
98304:WjzV+xBDel4pbPEz6QdzzkXFdL1pEx0Lcl4W/1DV7eMawz4:yYDf9PEz6QdzzYdL1psJyMa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NEAS.e246850a5f88ca3e91d39775c778a4d0.exe -
Executes dropped EXE 1 IoCs
pid Process 1648 SETUP.EXE -
resource yara_rule behavioral2/memory/4888-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4888-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1648 SETUP.EXE 1648 SETUP.EXE 1648 SETUP.EXE 1648 SETUP.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1648 4888 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 87 PID 4888 wrote to memory of 1648 4888 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 87 PID 4888 wrote to memory of 1648 4888 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e246850a5f88ca3e91d39775c778a4d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e246850a5f88ca3e91d39775c778a4d0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\SETUP.EXE"C:\Users\Admin\AppData\Local\Temp\RarSFX0\SETUP.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c