Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2023, 19:29

General

  • Target

    NEAS.d5181b938aba1dd59f7a52597a69a490.exe

  • Size

    9.8MB

  • MD5

    d5181b938aba1dd59f7a52597a69a490

  • SHA1

    ef75310b339c5475390ce10a4c5a6bd4a70578a9

  • SHA256

    342ff25c05649fb9ba1b103aca9e4bcc14bcc0be3406aa64e26e9a7557988197

  • SHA512

    834502d38247bd15f56f11826a7f9971e1ce900bd382c985c6e60658dcc7575085a2c35256a12ab9108c792e6801559a43d172def482282e60a3da82d8394ea0

  • SSDEEP

    196608:a8oIF/chXSyr4Rj+SEu03EnVxlXcC3YparCYxFvIt9:zyXprq+faPXpJvY9

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d5181b938aba1dd59f7a52597a69a490.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d5181b938aba1dd59f7a52597a69a490.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Windows\SysWOW64\more.com
      C:\Windows\SysWOW64\more.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
          PID:1176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\26201efc

      Filesize

      8.2MB

      MD5

      0a9bb9722fbd1cb2f12f9805ea30b02c

      SHA1

      6658afaea8757023d980f3612f3ac071a727c527

      SHA256

      baa8e776d702ab6e0fb0e42f1a38615d39c6b7f68b14aa401d111026183807bd

      SHA512

      78b087c491d42a0cf78640d6c303ff8973ac44bd3099795e1b2f3ea3a85f6b2726e10603ecc419a137fd27d32066fa889a9dcec83bb0f4cde6eb8f430b8c1629

    • memory/1176-22-0x00000000010C0000-0x00000000018A8000-memory.dmp

      Filesize

      7.9MB

    • memory/1176-30-0x00000000010C0000-0x00000000018A8000-memory.dmp

      Filesize

      7.9MB

    • memory/1176-29-0x00000000010C0000-0x00000000018A8000-memory.dmp

      Filesize

      7.9MB

    • memory/1176-27-0x00000000010C0000-0x00000000018A8000-memory.dmp

      Filesize

      7.9MB

    • memory/1176-25-0x00000000010C0000-0x00000000018A8000-memory.dmp

      Filesize

      7.9MB

    • memory/1176-24-0x00007FFB4FA90000-0x00007FFB4FC85000-memory.dmp

      Filesize

      2.0MB

    • memory/2620-10-0x00007FFB411E0000-0x00007FFB41352000-memory.dmp

      Filesize

      1.4MB

    • memory/2620-7-0x0000028E72110000-0x0000028E72118000-memory.dmp

      Filesize

      32KB

    • memory/2620-9-0x00007FFB411E0000-0x00007FFB41352000-memory.dmp

      Filesize

      1.4MB

    • memory/2620-8-0x00007FFB411E0000-0x00007FFB41352000-memory.dmp

      Filesize

      1.4MB

    • memory/3512-20-0x0000000075990000-0x0000000075B0B000-memory.dmp

      Filesize

      1.5MB

    • memory/3512-17-0x0000000075990000-0x0000000075B0B000-memory.dmp

      Filesize

      1.5MB

    • memory/3512-16-0x0000000075990000-0x0000000075B0B000-memory.dmp

      Filesize

      1.5MB

    • memory/3512-13-0x00007FFB4FA90000-0x00007FFB4FC85000-memory.dmp

      Filesize

      2.0MB