Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2023, 07:11
Behavioral task
behavioral1
Sample
NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe
-
Size
89KB
-
MD5
a7f4308c7faf91b6c1a8f110fc4b6a30
-
SHA1
bacf5a3a6e1e64185769d9f6e50771d4df8bfb7a
-
SHA256
f66988544270460344d76e1149517e986aa2eb9f3e8ed3bc604789255b495b5c
-
SHA512
382746bb6752428e2d80dac2e418560f0df5c1487101ce297ec1018a5c88b20d6010c53d0a4265c7c497f6b6c87a9edaa825581a08e184e3ff7e33fb4aaf1141
-
SSDEEP
1536:Q4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4mkOW0ITsQ3bFZHFlneXP:Q4X6NSyfnpijeYEoIcq4pvbPref
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2172-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/files/0x0006000000022df0-6.dat upx behavioral2/memory/2172-28-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\Kama Sutra Tetris.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\crack.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - xxx nurse scene.mpg.pif NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\ICQ Hackingtools.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Counter Strike CD Keygen.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Harry Potter and the sorcerors stone.divx.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Lolita preteen sex.mpeg.pif NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\jenna jameson sex scene huge dick blowjob.scr NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\aimcracker.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\virtua girl - adriana.pif NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\AIM Flooder.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\winxcfg.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\teen tied up and raped.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Pamela Anderson.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\AIM Account Stealer.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\MSN Flooder.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Want to see a massive horse cock in a tight little teen's pussy.mpg.pif NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Pamela Anderson And Tommy Lee Home Video (Part 1).mpg.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Warcraft 3 battle.net serial generator.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Bondage Fetish Foot Cum.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\OfficeXP Keygen.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Yahoo mail cracker.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\DivX pro key generator.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\XXX Porn Passwords.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Teen Violent Forced Gangbang.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\Flash Golf.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe File created C:\Windows\SysWOW64\macromd\AOL.exe NEAS.a7f4308c7faf91b6c1a8f110fc4b6a30.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5a79e062f44bc188079a4a195d19d9458
SHA10eaa7514b0dce50a30e23d9abb6d38d1a259f6b8
SHA2564a96fe3a5d3b4c2a2d36fd5fbcb7ecdd37a56305bfc1ed5c0e445a923864c4ae
SHA512e80fa9d3f302367d80017e876bf5f9b09d4ba2d5b6449f80bece87bed91fade308088d8c1cd31eb0d4810017e2b06804ccfeb11d259a5d8d620e97bafa49627c