Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 17:24

General

  • Target

    ede838238ccc3ed4bee258f7f18be650_NEAS.exe

  • Size

    123KB

  • MD5

    ede838238ccc3ed4bee258f7f18be650

  • SHA1

    1a52565221689d4a31a2268848e436c2e728f77e

  • SHA256

    d56b221609be58bd8010faefd76f12561cec90d4d4a49014a72dfb59f12ac05b

  • SHA512

    c6ce786a18626e2f1cdf2afd1d966badbc9cfb60b461bea4d94a48ae0836505c42d9bfa1be93d824ccd15a27064709d30296bea6083e3ec58e0680b57b5068f8

  • SSDEEP

    1536:a7ZyqaFAlsr1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSH:enaym3AIuZAIuYSMjoqtMHfhfx

Score
9/10

Malware Config

Signatures

  • Renames multiple (3446) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ede838238ccc3ed4bee258f7f18be650_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\ede838238ccc3ed4bee258f7f18be650_NEAS.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2144

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    123KB

    MD5

    ef8cee1da332ce55d8aec834f4039707

    SHA1

    1726c3ed566b4a5ca6f41e49f52b5193c0ba0eff

    SHA256

    aa9ffd465d72b0fe582f5656bb6ab70090580af82ccb0a0458c9d2b5c0b2ea20

    SHA512

    15447fdc7ecccd761c8191f1bbd8ce82255a4b74384b45f69f56ab5607702b0cae1b9fe8d1777c0e28ae6779a3177c03a815e4cb7f8b1d5983c68c3f121a191c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    132KB

    MD5

    40de599a53c22951c1e80f840f64d37a

    SHA1

    5e830590db1b8b05ad10a40838ba19cbb306ba35

    SHA256

    ec03083785b5879ac4ac46b7d807027bdee3ae622ff72476aedf46bde7bafe31

    SHA512

    71d8b45d5996cbfd2b3b92bcf5ed484d344c64f95a0dff24fb464ae01f84ae745af54a9f8eb3d171bc5e6b79cac3536c845c36d20963205ec6719ca5233efe44

  • memory/2144-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2144-654-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB