Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe
-
Size
145KB
-
MD5
d8362873ab63b6d1228a8b981b16fa1f
-
SHA1
9b1872d88a7dabbc6ea63c67e3f9b064b3b98e82
-
SHA256
d6efb5e23cd8124846e34b9adf07e1f12b1e2f06d5a5f7c05b712b26d4c71709
-
SHA512
8abd8ab4446d9b273d2324f19379633f1d21ae928224191a3f22043f1cc5dd3d18149de03dde8f90fbc4d9f95374285e91891d2e58108f282ba93320783e846a
-
SSDEEP
768:P/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfL/G:PRsvcdcQjosnvnZ6LQ1E/G
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe -
Executes dropped EXE 1 IoCs
pid Process 3836 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe 3836 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 3836 4180 NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe 92 PID 4180 wrote to memory of 3836 4180 NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe 92 PID 4180 wrote to memory of 3836 4180 NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d8362873ab63b6d1228a8b981b16fa1f.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5d3fa295d4a630f9d2f8e00e3e291809f
SHA1a497d652f9266b40a502229675010f63e45b86a2
SHA256413fe20c07a7a261064ed31f4a8b45bd37e45464b1ca4ee73463821fee29d30e
SHA5122cca5fdde59f4b2b530d82435874b230f9f9071425d4799bba09e8095491b9e2fc4e361efaa6e4cfa23fac2e010ef9dcdccd31ee3458dd37f79d1d524ab772d8
-
Filesize
145KB
MD5d3fa295d4a630f9d2f8e00e3e291809f
SHA1a497d652f9266b40a502229675010f63e45b86a2
SHA256413fe20c07a7a261064ed31f4a8b45bd37e45464b1ca4ee73463821fee29d30e
SHA5122cca5fdde59f4b2b530d82435874b230f9f9071425d4799bba09e8095491b9e2fc4e361efaa6e4cfa23fac2e010ef9dcdccd31ee3458dd37f79d1d524ab772d8
-
Filesize
145KB
MD5d3fa295d4a630f9d2f8e00e3e291809f
SHA1a497d652f9266b40a502229675010f63e45b86a2
SHA256413fe20c07a7a261064ed31f4a8b45bd37e45464b1ca4ee73463821fee29d30e
SHA5122cca5fdde59f4b2b530d82435874b230f9f9071425d4799bba09e8095491b9e2fc4e361efaa6e4cfa23fac2e010ef9dcdccd31ee3458dd37f79d1d524ab772d8