Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 04:04

General

  • Target

    61fed1c6d28b5f76bd832e0c6e8e5f40_NEAS.exe

  • Size

    313KB

  • MD5

    61fed1c6d28b5f76bd832e0c6e8e5f40

  • SHA1

    5f030c5c0de31e500ba2c66bfdb157c0fbd928eb

  • SHA256

    5c811b33dcbf0e17d4180d63fabb6ba084c0ddaca666ae470cab98761ad92393

  • SHA512

    7de5e881b2980569be05f53bf13444ae1e34bc610613f4d64bf392197a00910132eba844949d7e52f7e20b4e60762cb5bd808f0287c035a065d40846c944a09a

  • SSDEEP

    6144:JiQSo1EZGtKgZGtK/CAIuZAIuExQSo1EZGtKgZGtK/CAIuZAIuZ:AQtyZGtKgZGtK/CAIuZAIuExQtyZGtKF

Score
9/10

Malware Config

Signatures

  • Renames multiple (4428) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61fed1c6d28b5f76bd832e0c6e8e5f40_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\61fed1c6d28b5f76bd832e0c6e8e5f40_NEAS.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4184

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-877519540-908060166-1852957295-1000\desktop.ini.tmp

    Filesize

    313KB

    MD5

    c79d491e669612d54bf1b6b74cbce005

    SHA1

    c8f355a94826c4b37ca130b7718bcdde5a5747cc

    SHA256

    137c64169ffeac0cf38c78e4205727aa7094e7fc58344b0a54b4423800a31e90

    SHA512

    894e6197bc8edcd4f9c253f85b40cc0cf374a104df3db5916e5f9870397210a09af4d428d97316fadc1326f1770def081d6486e21731ee58fe95d2dd847625e8

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    412KB

    MD5

    0fc22fa3fff5967b3c42f13080cd6439

    SHA1

    0c5fe5ec8076a8e750853a698b18db70bd4db274

    SHA256

    146343c4a8092641b77f9f6e17af18d0cad5d7f6bf4bd929463315b5b61d48e5

    SHA512

    b919f5d2638304758a481feb19078a49329149a9c3e451a3c0ae7aa74179f7859b658e23e659836b993228aff9a51530f2cb634134f964194ac12581effef146

  • memory/4184-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4184-1450-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB