Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/11/2023, 06:03

General

  • Target

    NEAS.449f0a7d32d9a7dab74959910107e6d0.exe

  • Size

    110KB

  • MD5

    449f0a7d32d9a7dab74959910107e6d0

  • SHA1

    ff4b11a16b4fe924f71035ee5e9bd511ff7bc2c0

  • SHA256

    258875f6ca53a44ea85aaebb96f556d40ac479b15148fabcbbbff080f2f7af58

  • SHA512

    adaafd2a5eec9a347063c46def488f0faad0f963a32d149bf7174fe0b0a5551b646120f47ad22faadf5d2333c26b74a721f17bfb70f44864b0367d21abbdb072

  • SSDEEP

    1536:ELNIW39SaZTbFARlq7jC1OZstZu0TSVEdUJWTWd18f0:ELlbZTZX3BAtTSVEdUJWTWd18f0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.449f0a7d32d9a7dab74959910107e6d0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.449f0a7d32d9a7dab74959910107e6d0.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\ProgramData\Graphics\guifx.exe
      "C:\ProgramData\Graphics\guifx.exe" /run
      2⤵
      • Executes dropped EXE
      PID:4084
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\NEAS.449f0a7d32d9a7dab74959910107e6d0.exe" >> NUL
      2⤵
        PID:3484

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Graphics\guifx.exe

      Filesize

      110KB

      MD5

      c54bf860bef9b10ad4033f7101214a87

      SHA1

      24be1cada2af06d114c8be9d88121d4e0a6e301c

      SHA256

      ad8f47dc04d901bb323ff36c04221ef2381706262e389cc8dc73f9adec2cb1d7

      SHA512

      14d124d3f5c8760b46062a7f4129a78e5a91c311ad02607ab6fd8ef8622c8ceb69d700b1fd24b85e02a1a4aa66c24c805f2d56ac033e2ece6ee13669a1dc49b1

    • C:\ProgramData\Graphics\guifx.exe

      Filesize

      110KB

      MD5

      c54bf860bef9b10ad4033f7101214a87

      SHA1

      24be1cada2af06d114c8be9d88121d4e0a6e301c

      SHA256

      ad8f47dc04d901bb323ff36c04221ef2381706262e389cc8dc73f9adec2cb1d7

      SHA512

      14d124d3f5c8760b46062a7f4129a78e5a91c311ad02607ab6fd8ef8622c8ceb69d700b1fd24b85e02a1a4aa66c24c805f2d56ac033e2ece6ee13669a1dc49b1

    • memory/1400-0-0x0000000000020000-0x000000000003C000-memory.dmp

      Filesize

      112KB

    • memory/1400-6-0x0000000000020000-0x000000000003C000-memory.dmp

      Filesize

      112KB

    • memory/1400-8-0x0000000000020000-0x000000000003C000-memory.dmp

      Filesize

      112KB

    • memory/4084-4-0x0000000000550000-0x000000000056C000-memory.dmp

      Filesize

      112KB

    • memory/4084-7-0x0000000000550000-0x000000000056C000-memory.dmp

      Filesize

      112KB