Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
d2904d0160baebf4e39c8772e3349dd0_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d2904d0160baebf4e39c8772e3349dd0_NEAS.exe
Resource
win10v2004-20240426-en
General
-
Target
d2904d0160baebf4e39c8772e3349dd0_NEAS.exe
-
Size
359KB
-
MD5
d2904d0160baebf4e39c8772e3349dd0
-
SHA1
bd0a4bda0c4d59296cd3c0a1a5875f250b529c98
-
SHA256
809b2c61db59fd7b9510b145edc50c627051d33bc7e16e1df8c74f568b716da0
-
SHA512
f65c104672038fe0e9c94c2b8a4c0ada7905bb0d430ccd64bcb39bdb4d3345e7ba7945dd1ab4f1314a9ebea80c283f1b75f5052c67758e879264963113d2c366
-
SSDEEP
6144:joz4h3KEL7TlwmKoYVreNsbQXnkwilxlSaF6Kp4q/MgVz4Y5gDKK0LHYtVzbOJo:wqblwToYVreNsbQXnZiDF6Kp4QvVzd5g
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4760 d2904d0160baebf4e39c8772e3349dd0_NEAS.exe -
Executes dropped EXE 1 IoCs
pid Process 4760 d2904d0160baebf4e39c8772e3349dd0_NEAS.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 4700 4424 WerFault.exe 81 4280 4760 WerFault.exe 86 2540 4760 WerFault.exe 86 4480 4760 WerFault.exe 86 3996 4760 WerFault.exe 86 4912 4760 WerFault.exe 86 1648 4760 WerFault.exe 86 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4424 d2904d0160baebf4e39c8772e3349dd0_NEAS.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4760 d2904d0160baebf4e39c8772e3349dd0_NEAS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4760 4424 d2904d0160baebf4e39c8772e3349dd0_NEAS.exe 86 PID 4424 wrote to memory of 4760 4424 d2904d0160baebf4e39c8772e3349dd0_NEAS.exe 86 PID 4424 wrote to memory of 4760 4424 d2904d0160baebf4e39c8772e3349dd0_NEAS.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2904d0160baebf4e39c8772e3349dd0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\d2904d0160baebf4e39c8772e3349dd0_NEAS.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 3842⤵
- Program crash
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\d2904d0160baebf4e39c8772e3349dd0_NEAS.exeC:\Users\Admin\AppData\Local\Temp\d2904d0160baebf4e39c8772e3349dd0_NEAS.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 3523⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 7683⤵
- Program crash
PID:2540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 7723⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 7683⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 7763⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 8083⤵
- Program crash
PID:1648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4424 -ip 44241⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4760 -ip 47601⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4760 -ip 47601⤵PID:680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4760 -ip 47601⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4760 -ip 47601⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4760 -ip 47601⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4760 -ip 47601⤵PID:552
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD5f5960726db5ae62e1f00967522256055
SHA136a07a24357ec5471d93806248587bc6ceb7ff3b
SHA2565e9ace072ef05d2acbf4bf37ded32768d3c5473a0901141f52a31637862a800b
SHA51273dc7a5dd9cbe9f938d8179eadeb2fb317301f8afb541916c589731ac9cea0551fb284674b49ed27308b07b18fa600a6fae0f1e7d117fc6670de04a1c01c1c7d