Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 09:41

General

  • Target

    NEAS.fe41a939dd3c2f2eb8833681289a5700.exe

  • Size

    3.9MB

  • MD5

    fe41a939dd3c2f2eb8833681289a5700

  • SHA1

    de69c02e8209acba4e0fed9ed3cfaa4ea0e742e0

  • SHA256

    ff8f94fc24dbbeecf0efb07da1cebc0ec0359e1d7a9cf3b898acb543f29fba68

  • SHA512

    4480660484ec38a8e82ba5f33e61704548826f31ff04aa624c05fad09909538bbf83e405504a011e13b289603d06d1cfce0efe403c22b7403ecfab7c9a31ed71

  • SSDEEP

    98304:MtBS4neHvZjiEO5Ihd1T5HqDXJqNjpzS3vv3jirr3jjWiTaOvifviOrF:crnevd1NHqDXJqNj4

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4272
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev8FB8.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3412
      • C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE
        3⤵
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Enumerates connected drives
        • Suspicious use of FindShellTrayWindow
        PID:740
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev8FB8.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE!
        3⤵
          PID:4840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE

      Filesize

      3.9MB

      MD5

      e8aeeec03e177dc2ed46666d9e6c20a9

      SHA1

      fc7a831a9cb26916d49305f059e67507d9eee938

      SHA256

      07b9d438588acdf0379c33ee35ff6b3df62852ca571919e9eb6f6efd846731ec

      SHA512

      03ed25c73826c585a031e249b0114b444d9bf773cffdd8a1d77501f23aa6e845d63f0b72fc6d0fa5a92af41670f0711746e5f0e30ef278fc3cc6076e383c9999

    • C:\Users\Admin\AppData\Local\Temp\NEAS.FE41A939DD3C2F2EB8833681289A5700.EXE

      Filesize

      3.9MB

      MD5

      e8aeeec03e177dc2ed46666d9e6c20a9

      SHA1

      fc7a831a9cb26916d49305f059e67507d9eee938

      SHA256

      07b9d438588acdf0379c33ee35ff6b3df62852ca571919e9eb6f6efd846731ec

      SHA512

      03ed25c73826c585a031e249b0114b444d9bf773cffdd8a1d77501f23aa6e845d63f0b72fc6d0fa5a92af41670f0711746e5f0e30ef278fc3cc6076e383c9999

    • C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe

      Filesize

      2.3MB

      MD5

      b469c4f9569a6636e40d363033268fd6

      SHA1

      d4882eaf7f42e56e68e06263f46c26d7234fc3e3

      SHA256

      94990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237

      SHA512

      b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15

    • C:\Users\Admin\AppData\Local\Temp\NEAS.fe41a939dd3c2f2eb8833681289a5700.exe

      Filesize

      3.9MB

      MD5

      e8aeeec03e177dc2ed46666d9e6c20a9

      SHA1

      fc7a831a9cb26916d49305f059e67507d9eee938

      SHA256

      07b9d438588acdf0379c33ee35ff6b3df62852ca571919e9eb6f6efd846731ec

      SHA512

      03ed25c73826c585a031e249b0114b444d9bf773cffdd8a1d77501f23aa6e845d63f0b72fc6d0fa5a92af41670f0711746e5f0e30ef278fc3cc6076e383c9999

    • C:\WINDOWS\MSWDM.EXE

      Filesize

      1.6MB

      MD5

      760b4551e14e64bf5b00a56538f939dc

      SHA1

      fbf784e20c484185c28e370308d74bb7d8aaae73

      SHA256

      20daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38

      SHA512

      e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0

    • C:\Windows\MSWDM.EXE

      Filesize

      1.6MB

      MD5

      760b4551e14e64bf5b00a56538f939dc

      SHA1

      fbf784e20c484185c28e370308d74bb7d8aaae73

      SHA256

      20daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38

      SHA512

      e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0

    • C:\Windows\MSWDM.EXE

      Filesize

      1.6MB

      MD5

      760b4551e14e64bf5b00a56538f939dc

      SHA1

      fbf784e20c484185c28e370308d74bb7d8aaae73

      SHA256

      20daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38

      SHA512

      e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0

    • C:\Windows\MSWDM.EXE

      Filesize

      1.6MB

      MD5

      760b4551e14e64bf5b00a56538f939dc

      SHA1

      fbf784e20c484185c28e370308d74bb7d8aaae73

      SHA256

      20daafbe1c6dac30e7b5ba7874640ad869d8691191f68eeb53928eb34bc1ea38

      SHA512

      e538cf212381d432c8eae76fb9041e78fa9db8002cfa7710c7c9d2cfdd7843222048043e7568710cb03c0e03aae54fe3d86246e9db77f7ac7261dfa76f6c7ae0

    • C:\Windows\dev8FB8.tmp

      Filesize

      2.3MB

      MD5

      b469c4f9569a6636e40d363033268fd6

      SHA1

      d4882eaf7f42e56e68e06263f46c26d7234fc3e3

      SHA256

      94990e977458246f8f4d21c4217b1ff37a7189bbf8a99af8fb84e0502ed0a237

      SHA512

      b2df30f38edefad6e5b5cd9376e226605b5f21700932a1777f7fd5aaf5d18d7f6b57dc7fe315232b94234b57aa8d3bb21e907d79a66d2866efce7512c271cd15

    • memory/3412-9-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/3412-25-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/4048-8-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/4048-0-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/4840-19-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/4840-23-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB