Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe
-
Size
395KB
-
MD5
27f3ee84cf6c103db746602bd309b4ae
-
SHA1
e7e88cff99c7fec0e8661f1066f6503a967e424d
-
SHA256
6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4
-
SHA512
bd67b9e9424c6c817c7ff0790139276155b611944243dc57bc526b1577cd195885fc87d792a455fb7a75a755e0c05e29e80739d23834b760b9f40c5db27f3745
-
SSDEEP
6144:fLhat7FJYk9idwSOr0TLlDtIY6wR+fjSTyHeZ:fts7FJnqZhDtr6wofjSTy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
pid pid_target Process procid_target 924 2112 WerFault.exe 72 3416 2112 WerFault.exe 72 4460 2112 WerFault.exe 72 5112 2112 WerFault.exe 72 2804 2112 WerFault.exe 72 4732 2112 WerFault.exe 72 1420 2112 WerFault.exe 72 800 2112 WerFault.exe 72 4448 2112 WerFault.exe 72 4216 2112 WerFault.exe 72 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3052 2112 NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe 122 PID 2112 wrote to memory of 3052 2112 NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe 122 PID 2112 wrote to memory of 3052 2112 NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 5842⤵
- Program crash
PID:924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 6682⤵
- Program crash
PID:3416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 7362⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 8562⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 8442⤵
- Program crash
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 8442⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 10082⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 10722⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 11242⤵
- Program crash
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Executes dropped EXE
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 13282⤵
- Program crash
PID:4216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2112 -ip 21121⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2112 -ip 21121⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2112 -ip 21121⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2112 -ip 21121⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2112 -ip 21121⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2112 -ip 21121⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2112 -ip 21121⤵PID:988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2112 -ip 21121⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2112 -ip 21121⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2112 -ip 21121⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD527f3ee84cf6c103db746602bd309b4ae
SHA1e7e88cff99c7fec0e8661f1066f6503a967e424d
SHA2566acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4
SHA512bd67b9e9424c6c817c7ff0790139276155b611944243dc57bc526b1577cd195885fc87d792a455fb7a75a755e0c05e29e80739d23834b760b9f40c5db27f3745
-
Filesize
395KB
MD527f3ee84cf6c103db746602bd309b4ae
SHA1e7e88cff99c7fec0e8661f1066f6503a967e424d
SHA2566acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4
SHA512bd67b9e9424c6c817c7ff0790139276155b611944243dc57bc526b1577cd195885fc87d792a455fb7a75a755e0c05e29e80739d23834b760b9f40c5db27f3745
-
Filesize
395KB
MD527f3ee84cf6c103db746602bd309b4ae
SHA1e7e88cff99c7fec0e8661f1066f6503a967e424d
SHA2566acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4
SHA512bd67b9e9424c6c817c7ff0790139276155b611944243dc57bc526b1577cd195885fc87d792a455fb7a75a755e0c05e29e80739d23834b760b9f40c5db27f3745