Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
NEAS.028b25f1f0a537977493d76f32a80570.exe
-
Size
722KB
-
Sample
231107-tdr42sch68
-
MD5
028b25f1f0a537977493d76f32a80570
-
SHA1
a442c83bbc521d8d77671ab83fd0edeab710c115
-
SHA256
6ea019b1198f52147a2871899c9571f75057c2de6b86dd374f4c297a977dab2f
-
SHA512
4cfca4044d1cb37cbb91ed72490b615ef3514bb52db48ea20d451bcc6aefba9c50b6a476e5e2bde1b6bac64633444dbcf3f4da1a1877733b38a1e526f88bea85
-
SSDEEP
12288:GihV27JbZVpni7HSufIGzdl/3PaSQsCrX7KaURM5o4UV8Sq9HM++p9qy9u:uNZjnijBIcx35QZ7Oy5oN+9OEyU
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.028b25f1f0a537977493d76f32a80570.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.028b25f1f0a537977493d76f32a80570.exe
Resource
win10v2004-20231025-en
Malware Config
Targets
-
-
Target
NEAS.028b25f1f0a537977493d76f32a80570.exe
-
Size
722KB
-
MD5
028b25f1f0a537977493d76f32a80570
-
SHA1
a442c83bbc521d8d77671ab83fd0edeab710c115
-
SHA256
6ea019b1198f52147a2871899c9571f75057c2de6b86dd374f4c297a977dab2f
-
SHA512
4cfca4044d1cb37cbb91ed72490b615ef3514bb52db48ea20d451bcc6aefba9c50b6a476e5e2bde1b6bac64633444dbcf3f4da1a1877733b38a1e526f88bea85
-
SSDEEP
12288:GihV27JbZVpni7HSufIGzdl/3PaSQsCrX7KaURM5o4UV8Sq9HM++p9qy9u:uNZjnijBIcx35QZ7Oy5oN+9OEyU
Score10/10-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Renames multiple (51) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1