Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/11/2023, 17:23

General

  • Target

    NEAS.7471d5098b5ed288244e55d09fac9039.exe

  • Size

    108KB

  • MD5

    7471d5098b5ed288244e55d09fac9039

  • SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

  • SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

  • SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • SSDEEP

    768:qZL/0F24lercjO4sTZg5ZLvn2IuWZ0kqqNPWQHS:OLsF2Kerc64sTiX2IV0DB1

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.7471d5098b5ed288244e55d09fac9039.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.7471d5098b5ed288244e55d09fac9039.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe
      "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" -r
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 2&del "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"&ping 127.0.0.1 -n 2&rename "C:\Users\Admin\AppData\Roaming\Mozilla\00005EE0" WINWORD.exe&ping 127.0.0.1 -n 2&"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 2
          4⤵
          • Runs ping.exe
          PID:2512
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 2
          4⤵
          • Runs ping.exe
          PID:2388
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 2
          4⤵
          • Runs ping.exe
          PID:4336
        • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe
          "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:1564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Mozilla\00005EE0

    Filesize

    108KB

    MD5

    2f16745da0bbd90a2a4e1801c90927bd

    SHA1

    d85921240b696204522771140909ba05b3199b8e

    SHA256

    044dd0cf7d945c3fd5986deb1a821a595e6738c2f69c624fc9acf43c534830dc

    SHA512

    c4bf6dca89cba580a0f215e05a905c1143eed0081ff9564ef4c1ae3c6b75635bc3b119c41f532fdf577ced119b6cb49b828caf77ba4a2d45e64adc72a1ddc0ad

  • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    7471d5098b5ed288244e55d09fac9039

    SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

    SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

    SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    7471d5098b5ed288244e55d09fac9039

    SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

    SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

    SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    7471d5098b5ed288244e55d09fac9039

    SHA1

    fd60d0efe12ff154b5d769aafd674c2fafa3faf0

    SHA256

    ed3c9ca01f9783ac7fd57d796a6498576144a9372a3943bdf0e0cf3188bf8ac1

    SHA512

    db54d946d40aef84470b6b87a9c279d63bbb5cb42e5e7ecf233ba442899d4badbb1a6d53b78edfba0f06c4e61db0b675752765296aba8494d4b8653fa730fc7f

  • C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe

    Filesize

    108KB

    MD5

    2f16745da0bbd90a2a4e1801c90927bd

    SHA1

    d85921240b696204522771140909ba05b3199b8e

    SHA256

    044dd0cf7d945c3fd5986deb1a821a595e6738c2f69c624fc9acf43c534830dc

    SHA512

    c4bf6dca89cba580a0f215e05a905c1143eed0081ff9564ef4c1ae3c6b75635bc3b119c41f532fdf577ced119b6cb49b828caf77ba4a2d45e64adc72a1ddc0ad