Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe
-
Size
69KB
-
MD5
07f058d68b7fadbc0d9b67d596d3e860
-
SHA1
10158a48c498b529684fb525ad8ece2eb9b919b5
-
SHA256
50bfdf56b7719901cff812f2bb45b0c1912913f88d0eaf418a137c3a7708cb53
-
SHA512
39c211eb7b3760264dde9b8af5777e8c665a5e96eec0d6ee780d543abf3a65750247e750d2783a27bffe49e8f2460db253d2cbdd0b93bb9f4182e0fc7542787d
-
SSDEEP
768:OrItKyw5WHXfQmjIiIk9ecAa7pP1VMs96MyX9DdtldE9rIIIwjkMuuuR:Or3Z5IfQmv81a7pP1F3yXFdtnSjPuuuR
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2804 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe -
Executes dropped EXE 1 IoCs
pid Process 3708 akmhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\akmhost.exe attrib.exe File created C:\Windows\Debug\akmhost.exe NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe File opened for modification C:\Windows\Debug\akmhost.exe NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 akmhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz akmhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4528 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4528 wrote to memory of 2804 4528 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 91 PID 4528 wrote to memory of 2804 4528 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 91 PID 4528 wrote to memory of 2804 4528 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 91 PID 4528 wrote to memory of 1040 4528 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 94 PID 4528 wrote to memory of 1040 4528 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 94 PID 4528 wrote to memory of 1040 4528 NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2804 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.07f058d68b7fadbc0d9b67d596d3e860.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\akmhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEAS07~1.EXE > nul2⤵PID:1040
-
-
C:\Windows\Debug\akmhost.exeC:\Windows\Debug\akmhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD59e8a6acc0e82479e646d4edd5272da50
SHA17c617723e52f36a074cbe473f24503666925b7d1
SHA256a1333b4acd47be6af6cecb7d1fe77c00f74cc3406752a6ce2099ae9a6586d171
SHA51218f9beb5cea2b3d79e9851161c3895fe6bbf23ecbb4c91c346a3de6bface24c6805cb623f89e301bad6465e8d3ac6ec7b41ca43cc5654863a32361ec8a6f5559
-
Filesize
69KB
MD59e8a6acc0e82479e646d4edd5272da50
SHA17c617723e52f36a074cbe473f24503666925b7d1
SHA256a1333b4acd47be6af6cecb7d1fe77c00f74cc3406752a6ce2099ae9a6586d171
SHA51218f9beb5cea2b3d79e9851161c3895fe6bbf23ecbb4c91c346a3de6bface24c6805cb623f89e301bad6465e8d3ac6ec7b41ca43cc5654863a32361ec8a6f5559