Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2023, 15:44

General

  • Target

    NEAS.a5d40872d05137e574dacef2149acf40.exe

  • Size

    132KB

  • MD5

    a5d40872d05137e574dacef2149acf40

  • SHA1

    76eabeae178e0d2f3ca1429b2e9282627e7a4695

  • SHA256

    bd95e31e7180c1929a8d0d6afb8a738aaba94cfd50a50b22e25ac94eb4854eff

  • SHA512

    3001e1f7a5f2840469c43e3706e901ab566360fc4f47d541150bc5f965d776379c97cf5d0cde1686b532aea7d3d20aafc81f23bee2c6f1bd83d8cf431b280629

  • SSDEEP

    3072:J3UG0Trhel16r6cLlFSEDfO/rdVb2C/tld2w056Ap8wtJ+8:J3ZCYmGMNfzYHd2fplT

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a5d40872d05137e574dacef2149acf40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.a5d40872d05137e574dacef2149acf40.exe"
    1⤵
    • Checks computer location settings
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Local\Temp\NEAS.a5d40872d05137e574dacef2149acf40.exe.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.a5d40872d05137e574dacef2149acf40.exe.exe"
      2⤵
      • Executes dropped EXE
      PID:3100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.buf

    Filesize

    2.2MB

    MD5

    b66bf1b231e3a4d1c8509a1c28c68792

    SHA1

    c370b63a7dba75c6767ecbca1820d290c9fdee33

    SHA256

    ef60215d99cba0e447254bc69fa969d778c6ef6b484ddd8f291f929f7f545f1b

    SHA512

    4390bd32cff4b46780b558e1c986144f37f3f0a56eb87fd9c44f207ba16296bfa3cc821a0fcf0ccda9b2976493c3a495917cec2d3cfd37833c29fd2def2a2d8d

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a5d40872d05137e574dacef2149acf40.exe.exe

    Filesize

    16KB

    MD5

    36c766f80da94fe10fb6ebed2ac404b8

    SHA1

    a07443ccbcb6af10d312072aeb8d1bfe74bb5efb

    SHA256

    1bf5da4244994df5aad4b0c9a3f184f8462c4deb95525e93c2e616eecabfd419

    SHA512

    e39fcf32d62c686c8d801b1dd388e9c007f8056e8e850b04ede8e6b1ae8ec30c159b1e6db1f63a59c99904a8b10da09c2f22eb327b84f5177b71eb280af1fe06

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a5d40872d05137e574dacef2149acf40.exe.exe

    Filesize

    16KB

    MD5

    36c766f80da94fe10fb6ebed2ac404b8

    SHA1

    a07443ccbcb6af10d312072aeb8d1bfe74bb5efb

    SHA256

    1bf5da4244994df5aad4b0c9a3f184f8462c4deb95525e93c2e616eecabfd419

    SHA512

    e39fcf32d62c686c8d801b1dd388e9c007f8056e8e850b04ede8e6b1ae8ec30c159b1e6db1f63a59c99904a8b10da09c2f22eb327b84f5177b71eb280af1fe06

  • memory/2840-68-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2840-120-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB