Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 12:19

General

  • Target

    74e81b54a7d03c8725673906498c5cb0_NEAS.exe

  • Size

    2.0MB

  • MD5

    74e81b54a7d03c8725673906498c5cb0

  • SHA1

    4de7d8ed3e1cfb6d4b65551d752c9403ff22c7db

  • SHA256

    7eb5bc82cf707f1397cd3fcd2ae112356836e0c996c16b79bfe60f561192b167

  • SHA512

    266631f953599541e4c90891ac3dc8727d5e52ef377e6a0aeb244852f34e99b47e9ee91f61229edb83123aad47b68e29f0673c392d4672afcdfa366e83e50b91

  • SSDEEP

    49152:OFUcx88PWPOpX0SFK2oYR00PYWMCtKGNZBNczKCl8yGc:O+K88uPCHf00P/MoKGFNuF8yGc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\74e81b54a7d03c8725673906498c5cb0_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\74e81b54a7d03c8725673906498c5cb0_NEAS.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Users\Admin\AppData\Local\Temp\321C.tmp
      "C:\Users\Admin\AppData\Local\Temp\321C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\74e81b54a7d03c8725673906498c5cb0_NEAS.exe 1AA3BB598FC19B0BC89F4E8F49962FDDDBCA5915B309D14154C3BF2D79628FD8584ECECDE0B8750280DF38C07D9205305FF51355604D67D6F54D69B29071189C
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\74e81b54a7d03c8725673906498c5cb0_NEAS.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\321C.tmp

    Filesize

    2.0MB

    MD5

    52d18b0450718675f4b1558876ed66f8

    SHA1

    e2a5c1f12558e88f42784f48ae7da7eeb6d47ad4

    SHA256

    0c6b953f803a38cff53764fab7df20732088e12c34e1b2f5e5c4472c488236b9

    SHA512

    36e2c6cd8860a5964a257386b0f9d0b2d3d78029518cf24f844470941b5e9360431c66460061ab0cb5659b51162a831f6b058c1b80cf9122f517e622d1a4f72e

  • C:\Users\Admin\AppData\Local\Temp\74e81b54a7d03c8725673906498c5cb0_NEAS.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • memory/2288-18-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-31-0x00007FFDAF820000-0x00007FFDAF830000-memory.dmp

    Filesize

    64KB

  • memory/2288-11-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

    Filesize

    64KB

  • memory/2288-13-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

    Filesize

    64KB

  • memory/2288-14-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

    Filesize

    64KB

  • memory/2288-12-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

    Filesize

    64KB

  • memory/2288-15-0x00007FFDF1E8D000-0x00007FFDF1E8E000-memory.dmp

    Filesize

    4KB

  • memory/2288-16-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

    Filesize

    64KB

  • memory/2288-17-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-19-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-48-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-20-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-22-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-26-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-21-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-25-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-29-0x00007FFDAF820000-0x00007FFDAF830000-memory.dmp

    Filesize

    64KB

  • memory/2288-28-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-27-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-23-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-30-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-24-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-32-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-5-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/4332-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB