Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    188s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2023, 06:48

General

  • Target

    NEAS.23806a8e7334a1ffd8120fafb989b440.exe

  • Size

    9.4MB

  • MD5

    23806a8e7334a1ffd8120fafb989b440

  • SHA1

    fa2e0fd59d4ec8cf63c9003aa60cbeb729884b86

  • SHA256

    69f2adfafcb8e0a93ca793ff28df7b49100113ff2d7f92c7a2af4073a8db33ff

  • SHA512

    f2f8588ef3af44a5d855f0f6d82c08fae2abe71c565c5009b69a74e77dd5571e1b650152f7281fc1da29a9191220f145f81f1dfbb60d21bf42e6ed1a01bcfdfa

  • SSDEEP

    98304:yI9BsiUtk8XI8XxK8XI8XBUqk8XI8X+Utk8XI8XxJ8XfUqk8XI8X+Utk8XI8XC:yI9hU/h5hRUkhOU/h0vUkhOU/hy

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.23806a8e7334a1ffd8120fafb989b440.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.23806a8e7334a1ffd8120fafb989b440.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Users\Admin\AppData\Local\Temp\quusaf.exe
      C:\Users\Admin\AppData\Local\Temp\quusaf.exe -run C:\Users\Admin\AppData\Local\Temp\NEAS.23806a8e7334a1ffd8120fafb989b440.exe
      2⤵
      • Sets service image path in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\quusaf.bat" "
        3⤵
          PID:1872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\quusaf.bat

      Filesize

      139B

      MD5

      b4ebf159bbdfff0e1b30392ff92fd561

      SHA1

      213b016877c84c92665570b614f2681dd949c010

      SHA256

      cba0acf50f8df513ac341d258d271357dc49cdcbc6e9a6287c3c2731a4089299

      SHA512

      c75cacae58da0cb595de761df509bf1fd233d993df7525e004d55213b18ee84d002d0c28c469f55c023e4371483b7dfc6d9a07f7a3d15f03e347313a145638df

    • C:\Users\Admin\AppData\Local\Temp\quusaf.exe

      Filesize

      10.0MB

      MD5

      b25222a9fb19e1bb047dbf15bdcb61dc

      SHA1

      9cfb5442d57aa2c06f1fe23c354c49c8276f8509

      SHA256

      3252e7b88b1c2fc6b8840e2afbb0e937725a3e24ac8213e9abcff644cf15ad93

      SHA512

      bce5f5aa3d4d0d44bc82916009920b1c2c517902d182e04bda63396e6761520eaa04dcded6b25eae56d35ee8825c1fba1e732495c192b74387a78eb06de32c1d

    • C:\Users\Admin\AppData\Local\Temp\quusaf.exe

      Filesize

      10.0MB

      MD5

      b25222a9fb19e1bb047dbf15bdcb61dc

      SHA1

      9cfb5442d57aa2c06f1fe23c354c49c8276f8509

      SHA256

      3252e7b88b1c2fc6b8840e2afbb0e937725a3e24ac8213e9abcff644cf15ad93

      SHA512

      bce5f5aa3d4d0d44bc82916009920b1c2c517902d182e04bda63396e6761520eaa04dcded6b25eae56d35ee8825c1fba1e732495c192b74387a78eb06de32c1d

    • memory/4232-9-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB

    • memory/4232-14-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/4232-16-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB

    • memory/4700-6-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB