Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7471d5098b5ed288244e55d09fac9039.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.7471d5098b5ed288244e55d09fac9039.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.7471d5098b5ed288244e55d09fac9039.exe
-
Size
108KB
-
MD5
7471d5098b5ed288244e55d09fac9039
-
SHA1
fd60d0efe12ff154b5d769aafd674c2fafa3faf0
-
SHA256
ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
-
SHA512
db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
SSDEEP
768:qZL/0F24lercjO4sTZg5ZLvn2IuWZ0kqqNPWQHS:OLsF2Kerc64sTiX2IV0DB1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.7471d5098b5ed288244e55d09fac9039.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WINWORD.exe -
Executes dropped EXE 2 IoCs
pid Process 4432 WINWORD.exe 1564 WINWORD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WINWORD = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\WINWORD.exe -r" WINWORD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4336 PING.EXE 2512 PING.EXE 2388 PING.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4432 4944 NEAS.7471d5098b5ed288244e55d09fac9039.exe 91 PID 4944 wrote to memory of 4432 4944 NEAS.7471d5098b5ed288244e55d09fac9039.exe 91 PID 4944 wrote to memory of 4432 4944 NEAS.7471d5098b5ed288244e55d09fac9039.exe 91 PID 4432 wrote to memory of 1496 4432 WINWORD.exe 92 PID 4432 wrote to memory of 1496 4432 WINWORD.exe 92 PID 4432 wrote to memory of 1496 4432 WINWORD.exe 92 PID 1496 wrote to memory of 2512 1496 cmd.exe 94 PID 1496 wrote to memory of 2512 1496 cmd.exe 94 PID 1496 wrote to memory of 2512 1496 cmd.exe 94 PID 1496 wrote to memory of 2388 1496 cmd.exe 95 PID 1496 wrote to memory of 2388 1496 cmd.exe 95 PID 1496 wrote to memory of 2388 1496 cmd.exe 95 PID 1496 wrote to memory of 4336 1496 cmd.exe 96 PID 1496 wrote to memory of 4336 1496 cmd.exe 96 PID 1496 wrote to memory of 4336 1496 cmd.exe 96 PID 1496 wrote to memory of 1564 1496 cmd.exe 97 PID 1496 wrote to memory of 1564 1496 cmd.exe 97 PID 1496 wrote to memory of 1564 1496 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7471d5098b5ed288244e55d09fac9039.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7471d5098b5ed288244e55d09fac9039.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" -r2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 2&del "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"&ping 127.0.0.1 -n 2&rename "C:\Users\Admin\AppData\Roaming\Mozilla\00005EE0" WINWORD.exe&ping 127.0.0.1 -n 2&"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r3⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2512
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2388
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:4336
-
-
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD52f16745da0bbd90a2a4e1801c90927bd
SHA1d85921240b696204522771140909ba05b3199b8e
SHA256044dd0cf7d945c3fd5986deb1a821a595e6738c2f69c624fc9acf43c534830dc
SHA512c4bf6dca89cba580a0f215e05a905c1143eed0081ff9564ef4c1ae3c6b75635bc3b119c41f532fdf577ced119b6cb49b828caf77ba4a2d45e64adc72a1ddc0ad
-
Filesize
108KB
MD57471d5098b5ed288244e55d09fac9039
SHA1fd60d0efe12ff154b5d769aafd674c2fafa3faf0
SHA256ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
SHA512db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
Filesize
108KB
MD57471d5098b5ed288244e55d09fac9039
SHA1fd60d0efe12ff154b5d769aafd674c2fafa3faf0
SHA256ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
SHA512db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
Filesize
108KB
MD57471d5098b5ed288244e55d09fac9039
SHA1fd60d0efe12ff154b5d769aafd674c2fafa3faf0
SHA256ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1
SHA512db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f
-
Filesize
108KB
MD52f16745da0bbd90a2a4e1801c90927bd
SHA1d85921240b696204522771140909ba05b3199b8e
SHA256044dd0cf7d945c3fd5986deb1a821a595e6738c2f69c624fc9acf43c534830dc
SHA512c4bf6dca89cba580a0f215e05a905c1143eed0081ff9564ef4c1ae3c6b75635bc3b119c41f532fdf577ced119b6cb49b828caf77ba4a2d45e64adc72a1ddc0ad