Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    164s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2023, 08:02

General

  • Target

    NEAS.03a787f6865d3e4eda3feb9c9e551470.exe

  • Size

    932KB

  • MD5

    03a787f6865d3e4eda3feb9c9e551470

  • SHA1

    59541b4cc01f40c2804ec64e145ca1bec0f8da19

  • SHA256

    1a80e249ff1e154bb002028e4fe0248ea26cb8833ab8cca97798c4dd80ecdca3

  • SHA512

    6a41aaa3fcce4a6cf3ad9badb6ce4a7f3710280ccfbebf0ff2631a30458a9c79da10c8c197d3ce04f998b37433563b2a49b3ea66f3e601fc7c475990f5d6f4ed

  • SSDEEP

    12288:P1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdCt+nNxzKrqu:P1/aGLDCM4D8ayGMZo8/+t+FW5lKLw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.03a787f6865d3e4eda3feb9c9e551470.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.03a787f6865d3e4eda3feb9c9e551470.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\ProgramData\nclxg.exe
      "C:\ProgramData\nclxg.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:5036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    932KB

    MD5

    75d8711806291043d1bad64e18b57c6f

    SHA1

    c8f40fe9566da4006c0b26f2d9f02e5fe8fd7f3e

    SHA256

    3ac2ca2418121e7b98ec032f5ae6b2604d9f9f2da94ea9f43ed893b2e3b3dde9

    SHA512

    941dd3af4e1e6a819f56102ca082d6964b0335147034efc3f4aa7326e774d1ea6817e2fd4be2d71cde81c9b9479b18f2aa25a7e0b9c1566790254e1d42c4c8e5

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    70d6cb7dd01ebd5a21af02945d2ae12f

    SHA1

    05260b3e17a221e66b58d1e5ed1d0f518392159a

    SHA256

    136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92

    SHA512

    b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    70d6cb7dd01ebd5a21af02945d2ae12f

    SHA1

    05260b3e17a221e66b58d1e5ed1d0f518392159a

    SHA256

    136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92

    SHA512

    b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9

  • C:\ProgramData\nclxg.exe

    Filesize

    454KB

    MD5

    7cced8bbeffa047bb495c0f21e9bfe69

    SHA1

    084e58c5c7b39acdca977f05733459829eb2c9e2

    SHA256

    e5b4bcd5ad98116b05e46bd4c970052929c77d834871eec7d381589453cc5bd0

    SHA512

    28feea83ba5a13512e0356239041fc6418970b4b9954f8282e5ab609665fe774f6e301d6b5eccb8399b73bd53c9cbdbe90cf82ed0db6b85eb47f1472f1664667

  • C:\ProgramData\nclxg.exe

    Filesize

    454KB

    MD5

    7cced8bbeffa047bb495c0f21e9bfe69

    SHA1

    084e58c5c7b39acdca977f05733459829eb2c9e2

    SHA256

    e5b4bcd5ad98116b05e46bd4c970052929c77d834871eec7d381589453cc5bd0

    SHA512

    28feea83ba5a13512e0356239041fc6418970b4b9954f8282e5ab609665fe774f6e301d6b5eccb8399b73bd53c9cbdbe90cf82ed0db6b85eb47f1472f1664667

  • memory/740-7-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/5036-24-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/5036-41-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/5036-102-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/5036-419-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/5036-589-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB