Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 11:55
Behavioral task
behavioral1
Sample
NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe
-
Size
56KB
-
MD5
5caaddde30b02f2f75ec821bfa354f00
-
SHA1
d6743eff90bf0f3f98a34cb872bc80adb99d64a9
-
SHA256
0c4362e3165fe16d7c23096f1e10798d413e7fc7b8333950fd0e89901b673478
-
SHA512
b1f2f0c31b80930cf3a78ff95e68d48faa30dd42b42bce7eba88526c47a22957c57c9e6f62dc5db20ff09046091e61a7293003dffd08727239e5169f59b44b9b
-
SSDEEP
768:eMq9m/ZsybSg2ts4L3RLc/qjhsKmMJ0UtH/hY+JFfJcqfB/L/O+:Xqk/Zdic/qjh8MJDH++vCwLf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3460 services.exe -
resource yara_rule behavioral2/memory/2320-0-0x0000000000500000-0x0000000000511000-memory.dmp upx behavioral2/files/0x0008000000022e1a-4.dat upx behavioral2/memory/3460-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0008000000022e1a-7.dat upx behavioral2/memory/2320-13-0x0000000000500000-0x0000000000511000-memory.dmp upx behavioral2/memory/3460-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0006000000022e89-32.dat upx behavioral2/memory/3460-77-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-118-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-188-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-225-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-262-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-314-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-351-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-397-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-443-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3460-480-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe File opened for modification C:\Windows\java.exe NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe File created C:\Windows\java.exe NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2320 wrote to memory of 3460 2320 NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe 86 PID 2320 wrote to memory of 3460 2320 NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe 86 PID 2320 wrote to memory of 3460 2320 NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5caaddde30b02f2f75ec821bfa354f00_JC.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5605de1f61d0446f81e63c25750e99301
SHA10eaf9121f9dc1338807a511f92ea0b30dc2982a5
SHA256049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0
SHA512a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285
-
Filesize
305B
MD52c4ce699b73ce3278646321d836aca40
SHA172ead77fbd91cfadae8914cbb4c023a618bf0bd1
SHA256e7391b33aeb3be8afbe1b180430c606c5d3368baf7f458254cef5db9eef966e3
SHA51289ec604cd4a4ad37c5392da0bb28bd9072d731a3efdd38707eeb7b1caf7626e6917da687529bf9426d8eb89fab23175399032d545d96ab93ffd19dd54c02c075
-
Filesize
304B
MD5084f55ccad6fddfe1704851a5074a194
SHA1844821de6a0f3c2410341af6b3979f6b59f16a3a
SHA256b10034ade693ec98852ac56ed2b784c546aeb3f11593a7ece687b17c283cb4cf
SHA512776a722ff79b1665f904be9972229f03b67c0a54c9ebb4b639d959e2c87398a3eb5930ebd7c2a03b14ccdbba380ae26ae1ffdbd1f65f8a900fddb4fde467aa31
-
Filesize
308B
MD5d633d65c70fce887db4580e12d24dda5
SHA18e37901eb72c58f96990f30fe13bb1dcb22874e8
SHA256358883157b84d0634a7a4cabb66dbd4d22f57db6526a8563dfa0748b122ef76b
SHA512357938278bfd73b7be94e286ee09730ffedf00be87a175e93a9bb25a8570caa79b8cbfb468c86d96d262fb31dbfba9f3b58aa134887752e8a4185f23cd2d5bae
-
Filesize
170KB
MD5b270b58574aa5da8c26ef961b642780c
SHA14abec5f59e59a282f85e51cf7a573e9ce068f0ca
SHA25626822329e51ffa2a94164d7ca27b9af8637cd98f154cb2aa1c6f384e58922be3
SHA51220c206be94f403413d6c5735cdf319fc7dcb3e15101b800eea3afa8fcc8a10927011ec9e4ae30103e1f62af3655dcc80e941305262c2af5dd4bda37a3ad60c3d
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
303B
MD56a62ed00d5950a7aa3df6d446d0beb92
SHA1608da2a7b63e92b731a7beb2d990405d7a6e9611
SHA2567aaaf31ea9c2999c775008a4b769336c91d87dc8f6dc0a1015bb45c61bc39fdb
SHA51210a77d30bd2a5a930233e79830ac6e0a695bcfacb4e33fe9a67a7dc4b4c0ffaf3ca6ce458bf2a6714b9c590997ff816f207bee87536516a2c8e711c3c161773d
-
Filesize
303B
MD5ab7421802af48230da4837d84ca54208
SHA1ee1036ca523fe527c1e4ff585983f59720d07e3e
SHA25687937d2d6d98641310a5ac9d849a483bd192318a197d352d5db7b074f926c944
SHA512c690cd667ba4a7f339c74276cdf2400ba8ebaa348ca83e2cb1ef26413e41a0ab96d9b6e13e697b3472ece4be2c85d2591977679383c43f4f55a40ab06476736d
-
Filesize
315B
MD514b82aec966e8e370a28053db081f4e9
SHA1a0f30ebbdb4c69947d3bd41fa63ec4929dddd649
SHA256202eada95ef503b303a05caf5a666f538236c7e697f5301fd178d994fa6e24cf
SHA512ec04f1d86137dc4d75a47ba47bb2f2c912115372fa000cf986d13a04121aae9974011aa716c7da3893114e0d5d0e2fb680a6c2fd40a1f93f0e0bfd6fd625dfa7
-
Filesize
302B
MD5e78ad40a5b69c78f72234320f451cdd5
SHA13fee199037ae9d6ba57e011ed8761cd42c5e5897
SHA256a6767cf522f21423bbaf20e10625aec518fd9c7aa961780fbe1426c8c9f71540
SHA5127c19281e8c85097da1000c7a124f4751fa05be2e374ad017bf4e79cb329ed3e5496f1a64e37fb73b1ec87cc757067d143ba4b172d48124effe32b88fafbd851b
-
Filesize
308B
MD55243568476eb2052b2f3b67dc9053e86
SHA1b126aa6506772f9024b76580bdf28b45e3a7f051
SHA2562d458622dc76eb87e44cc7db89309efdf50f99821145ae86864fd1b714cbaa80
SHA5123c68cef4e3daa4bca6e8b3aa5a31874be1e4dec38fe9781c6fe4890980744527d0c6818eeb519f8e6b322118e1f08302d85972fa7da4ba8be9421aabf9a77833
-
Filesize
304B
MD54d1a10f22e8332513741877c47ac8970
SHA1f68ecc13b7a71e948c6d137be985138586deb726
SHA256a0dbc1b7d129cfa07a5d324fb03e41717fbdd17be3903e7e3fd7f21878dfbba4
SHA5124f1e447c41f5b694bf2bff7f21a73f2bce00dfc844d3c7722ade44249d5ac4b50cf0319630b7f3fdb890bbd76528b6d0ed6b5ad98867d09cd90dcfbfd8b96860
-
Filesize
305B
MD5157431349a057954f4227efc1383ecad
SHA169ccc939e6b36aa1fabb96ad999540a5ab118c48
SHA2568553409a8a3813197c474a95d9ae35630e2a67f8e6f9f33b3f39ef4c78a8bfac
SHA5126405adcfa81b53980f448c489c1d13506d874d839925bffe5826479105cbf5ba194a7bdb93095585441c79c58de42f1dab1138b3d561011dc60f4b66d11e9284
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
56KB
MD5bea4ff16332364d3bd0fad02a6f6a76b
SHA16e6de9817beae4ff0f3dfe74f64c20e1bb177863
SHA2569cdbe21b5a5a53d92a5351c627b42f354788d5c86c38a242ac16c00fc59be9ad
SHA5120c451af74f389bca979724eea2aafe47986d63401a9eacbf6e31da3a485da882a905d50279e2023a477aaf340101e11e66338a0670e4a7f9a661b1f1a1cda33b
-
Filesize
1KB
MD5810b3845a69bb142db0e3b03c94b698f
SHA1d8513c835258b9d79cf04494f081255ce66a407f
SHA2563eda42df6bc53411eee144fcab351d5d8f13d79e227b30d89dde3ee021b3aaec
SHA5124b226c3cafbb955f78a2ab4b0a772f8f0a29eac51c0cc50325014ebfb9cc437fd136e842f6dc4e9b49fcb820634e317a293ff858cab9463ce69ade5c9291b896
-
Filesize
1KB
MD5c2ad49c7c6269f33eb70a688313ae8ab
SHA1a5d12beeec68263a0a247baaa116499a9f84debf
SHA2567a57777cc0d0a0c0a0a33cd3f9fa3119df581dd7af30a4486d040b38378ad990
SHA512c878e63769ce8968074fa3a54edff3c6f391718ba87e72f9324c9b01ff110f9f48fe17fa504a048dd712c4c5bf4fd7217474ef6b12113a753e503b829bf98ca1
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2