Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 06:03
Behavioral task
behavioral1
Sample
NEAS.449f0a7d32d9a7dab74959910107e6d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.449f0a7d32d9a7dab74959910107e6d0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.449f0a7d32d9a7dab74959910107e6d0.exe
-
Size
110KB
-
MD5
449f0a7d32d9a7dab74959910107e6d0
-
SHA1
ff4b11a16b4fe924f71035ee5e9bd511ff7bc2c0
-
SHA256
258875f6ca53a44ea85aaebb96f556d40ac479b15148fabcbbbff080f2f7af58
-
SHA512
adaafd2a5eec9a347063c46def488f0faad0f963a32d149bf7174fe0b0a5551b646120f47ad22faadf5d2333c26b74a721f17bfb70f44864b0367d21abbdb072
-
SSDEEP
1536:ELNIW39SaZTbFARlq7jC1OZstZu0TSVEdUJWTWd18f0:ELlbZTZX3BAtTSVEdUJWTWd18f0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.449f0a7d32d9a7dab74959910107e6d0.exe -
Executes dropped EXE 1 IoCs
pid Process 4084 guifx.exe -
resource yara_rule behavioral2/memory/1400-0-0x0000000000020000-0x000000000003C000-memory.dmp upx behavioral2/files/0x0006000000022cdd-3.dat upx behavioral2/memory/4084-4-0x0000000000550000-0x000000000056C000-memory.dmp upx behavioral2/files/0x0006000000022cdd-5.dat upx behavioral2/memory/1400-6-0x0000000000020000-0x000000000003C000-memory.dmp upx behavioral2/memory/4084-7-0x0000000000550000-0x000000000056C000-memory.dmp upx behavioral2/memory/1400-8-0x0000000000020000-0x000000000003C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graphics = "\"C:\\ProgramData\\Graphics\\guifx.exe\" /run" NEAS.449f0a7d32d9a7dab74959910107e6d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4084 1400 NEAS.449f0a7d32d9a7dab74959910107e6d0.exe 90 PID 1400 wrote to memory of 4084 1400 NEAS.449f0a7d32d9a7dab74959910107e6d0.exe 90 PID 1400 wrote to memory of 4084 1400 NEAS.449f0a7d32d9a7dab74959910107e6d0.exe 90 PID 1400 wrote to memory of 3484 1400 NEAS.449f0a7d32d9a7dab74959910107e6d0.exe 103 PID 1400 wrote to memory of 3484 1400 NEAS.449f0a7d32d9a7dab74959910107e6d0.exe 103 PID 1400 wrote to memory of 3484 1400 NEAS.449f0a7d32d9a7dab74959910107e6d0.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.449f0a7d32d9a7dab74959910107e6d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.449f0a7d32d9a7dab74959910107e6d0.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\ProgramData\Graphics\guifx.exe"C:\ProgramData\Graphics\guifx.exe" /run2⤵
- Executes dropped EXE
PID:4084
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\NEAS.449f0a7d32d9a7dab74959910107e6d0.exe" >> NUL2⤵PID:3484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD5c54bf860bef9b10ad4033f7101214a87
SHA124be1cada2af06d114c8be9d88121d4e0a6e301c
SHA256ad8f47dc04d901bb323ff36c04221ef2381706262e389cc8dc73f9adec2cb1d7
SHA51214d124d3f5c8760b46062a7f4129a78e5a91c311ad02607ab6fd8ef8622c8ceb69d700b1fd24b85e02a1a4aa66c24c805f2d56ac033e2ece6ee13669a1dc49b1
-
Filesize
110KB
MD5c54bf860bef9b10ad4033f7101214a87
SHA124be1cada2af06d114c8be9d88121d4e0a6e301c
SHA256ad8f47dc04d901bb323ff36c04221ef2381706262e389cc8dc73f9adec2cb1d7
SHA51214d124d3f5c8760b46062a7f4129a78e5a91c311ad02607ab6fd8ef8622c8ceb69d700b1fd24b85e02a1a4aa66c24c805f2d56ac033e2ece6ee13669a1dc49b1