Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2023, 07:21
Behavioral task
behavioral1
Sample
NEAS.82d8f58a170837c3a8426a6a3d372740.exe
Resource
win7-20231025-en
General
-
Target
NEAS.82d8f58a170837c3a8426a6a3d372740.exe
-
Size
436KB
-
MD5
82d8f58a170837c3a8426a6a3d372740
-
SHA1
b560ced3c13531bacd2df377e93b54cc430e157f
-
SHA256
ce88880c864e08ea3f05fda81c87f9836b911e749a5c06128ff680ec14a31e56
-
SHA512
c3fe4fdd54a124639ef2f863809ff9e8d59edb4f9f5e21b2c90270461255113c38fcaca6037995b87c9bdc76f401313239035bcacdcb8e794f0a2915ca64e943
-
SSDEEP
6144:0KcGGKC2No1dYL+cuGvd7jpBAbn+cioljJCnViTQBCA8R8Fs5cvxFQLrANOqk:G1KCJcuGvFpBAbnJj4nfBKmxFUrAlk
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation NEAS.82d8f58a170837c3a8426a6a3d372740.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation roxyc.exe -
Executes dropped EXE 2 IoCs
pid Process 3052 roxyc.exe 3352 epqis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe 3352 epqis.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3052 2212 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 89 PID 2212 wrote to memory of 3052 2212 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 89 PID 2212 wrote to memory of 3052 2212 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 89 PID 2212 wrote to memory of 4340 2212 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 90 PID 2212 wrote to memory of 4340 2212 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 90 PID 2212 wrote to memory of 4340 2212 NEAS.82d8f58a170837c3a8426a6a3d372740.exe 90 PID 3052 wrote to memory of 3352 3052 roxyc.exe 104 PID 3052 wrote to memory of 3352 3052 roxyc.exe 104 PID 3052 wrote to memory of 3352 3052 roxyc.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.82d8f58a170837c3a8426a6a3d372740.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.82d8f58a170837c3a8426a6a3d372740.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\roxyc.exe"C:\Users\Admin\AppData\Local\Temp\roxyc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\epqis.exe"C:\Users\Admin\AppData\Local\Temp\epqis.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:4340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286B
MD59e0157787d337ab97816d790f66ba499
SHA18aea5be667d5a627b444cbe13ebce0ed7dca8d21
SHA256a099c5cc7259c6a4875fae54ff2d720252932ee65d7450197181bb40eea90070
SHA512b815f63578fc389140aedc29aa5a8f62552bb8223873739f8a70fb75605cc7a4ce16292fc6002223adaf766748c0ba81623c417fa389d4a03203e9e24c9c4292
-
Filesize
196KB
MD5ed7d1971c70f53e93d429e3c0645d382
SHA128c5691e580df642aa5695b95da585e121727827
SHA256f1b78490d5f4fa037025f1b74c5fa651c71f24f1df93e241a50d41a2b9e4e856
SHA512bc7121acbcfb681b05bcec25d77fa5a1b60c286a89eb1f1566ac3d21b7fcb89f4b6e3d455f2d57548a6a91122c9a4371c5bb0c2124840ec668131fcbefbb726a
-
Filesize
196KB
MD5ed7d1971c70f53e93d429e3c0645d382
SHA128c5691e580df642aa5695b95da585e121727827
SHA256f1b78490d5f4fa037025f1b74c5fa651c71f24f1df93e241a50d41a2b9e4e856
SHA512bc7121acbcfb681b05bcec25d77fa5a1b60c286a89eb1f1566ac3d21b7fcb89f4b6e3d455f2d57548a6a91122c9a4371c5bb0c2124840ec668131fcbefbb726a
-
Filesize
196KB
MD5ed7d1971c70f53e93d429e3c0645d382
SHA128c5691e580df642aa5695b95da585e121727827
SHA256f1b78490d5f4fa037025f1b74c5fa651c71f24f1df93e241a50d41a2b9e4e856
SHA512bc7121acbcfb681b05bcec25d77fa5a1b60c286a89eb1f1566ac3d21b7fcb89f4b6e3d455f2d57548a6a91122c9a4371c5bb0c2124840ec668131fcbefbb726a
-
Filesize
512B
MD58569d9e0e742393343d004387be859fd
SHA1867709f540ac6f3d9ee16ecc2d053858b2076d90
SHA25691a1a8d45e94fe95de955d17fd6e5ac94f7a0b8133c6909059aa3e1b19ae810f
SHA512d3001ce6e57eccd0167ececed75adbdbfb94d3e9e11a66b517506d6b1056abaf26169bc01f69a64b29ed99b9b4938d20bbcd284ebb5e4fe45dbe6ceca09eef17
-
Filesize
436KB
MD536f55b0591b60d32d29517bed0f0db7d
SHA1602da6c05dba601572cbf1d91bd2f0ca565840ed
SHA25656c98b400c120779b75fe61b2edd97c7fc0f3700b0df364d92df0527bd2689f0
SHA5126214d7d5ccaba3b0701215966d06ef2e7e4ff703563e48202d8d6bcbc53caafa6d05d78ebacc06cd1c7ba6c338a72275d36315c08f76e8e395582b82827a4249
-
Filesize
436KB
MD536f55b0591b60d32d29517bed0f0db7d
SHA1602da6c05dba601572cbf1d91bd2f0ca565840ed
SHA25656c98b400c120779b75fe61b2edd97c7fc0f3700b0df364d92df0527bd2689f0
SHA5126214d7d5ccaba3b0701215966d06ef2e7e4ff703563e48202d8d6bcbc53caafa6d05d78ebacc06cd1c7ba6c338a72275d36315c08f76e8e395582b82827a4249
-
Filesize
436KB
MD536f55b0591b60d32d29517bed0f0db7d
SHA1602da6c05dba601572cbf1d91bd2f0ca565840ed
SHA25656c98b400c120779b75fe61b2edd97c7fc0f3700b0df364d92df0527bd2689f0
SHA5126214d7d5ccaba3b0701215966d06ef2e7e4ff703563e48202d8d6bcbc53caafa6d05d78ebacc06cd1c7ba6c338a72275d36315c08f76e8e395582b82827a4249