Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
200s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.521b06aa293edcd182bb96d327762360.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.521b06aa293edcd182bb96d327762360.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.521b06aa293edcd182bb96d327762360.exe
-
Size
207KB
-
MD5
521b06aa293edcd182bb96d327762360
-
SHA1
31849c52defe64aaba55d04c07d42579aef8cfd1
-
SHA256
ec7d5fce0da7f0940b8b5d7c96414362392999a45714c573210046a8d9450d7e
-
SHA512
e5f0894bd79b361491f4b4eb007ff9c86a6bcbb497b4ca248d639b1ef28d204da5c7f6eebacc9ad0b9179655d023bc8ee9b9b794ed8e9c1de60eaca3dfff2154
-
SSDEEP
3072:MvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unW:MvEN2U+T6i5LirrllHy4HUcMQY6d
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-274829-3448035668-3231875956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-274829-3448035668-3231875956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 5 IoCs
pid Process 2600 explorer.exe 2608 spoolsv.exe 2512 svchost.exe 2892 spoolsv.exe 1068 svchost.exe -
Loads dropped DLL 8 IoCs
pid Process 2864 NEAS.521b06aa293edcd182bb96d327762360.exe 2864 NEAS.521b06aa293edcd182bb96d327762360.exe 2600 explorer.exe 2600 explorer.exe 2608 spoolsv.exe 2608 spoolsv.exe 2512 svchost.exe 2512 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe NEAS.521b06aa293edcd182bb96d327762360.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2864 NEAS.521b06aa293edcd182bb96d327762360.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2512 svchost.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe 2512 svchost.exe 2600 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2600 explorer.exe 2512 svchost.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2864 NEAS.521b06aa293edcd182bb96d327762360.exe 2864 NEAS.521b06aa293edcd182bb96d327762360.exe 2600 explorer.exe 2600 explorer.exe 2608 spoolsv.exe 2608 spoolsv.exe 2512 svchost.exe 2512 svchost.exe 2892 spoolsv.exe 2892 spoolsv.exe 2600 explorer.exe 2600 explorer.exe 1068 svchost.exe 1068 svchost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2600 2864 NEAS.521b06aa293edcd182bb96d327762360.exe 29 PID 2864 wrote to memory of 2600 2864 NEAS.521b06aa293edcd182bb96d327762360.exe 29 PID 2864 wrote to memory of 2600 2864 NEAS.521b06aa293edcd182bb96d327762360.exe 29 PID 2864 wrote to memory of 2600 2864 NEAS.521b06aa293edcd182bb96d327762360.exe 29 PID 2600 wrote to memory of 2608 2600 explorer.exe 30 PID 2600 wrote to memory of 2608 2600 explorer.exe 30 PID 2600 wrote to memory of 2608 2600 explorer.exe 30 PID 2600 wrote to memory of 2608 2600 explorer.exe 30 PID 2608 wrote to memory of 2512 2608 spoolsv.exe 31 PID 2608 wrote to memory of 2512 2608 spoolsv.exe 31 PID 2608 wrote to memory of 2512 2608 spoolsv.exe 31 PID 2608 wrote to memory of 2512 2608 spoolsv.exe 31 PID 2512 wrote to memory of 2892 2512 svchost.exe 32 PID 2512 wrote to memory of 2892 2512 svchost.exe 32 PID 2512 wrote to memory of 2892 2512 svchost.exe 32 PID 2512 wrote to memory of 2892 2512 svchost.exe 32 PID 2512 wrote to memory of 1848 2512 svchost.exe 33 PID 2512 wrote to memory of 1848 2512 svchost.exe 33 PID 2512 wrote to memory of 1848 2512 svchost.exe 33 PID 2512 wrote to memory of 1848 2512 svchost.exe 33 PID 2512 wrote to memory of 1720 2512 svchost.exe 36 PID 2512 wrote to memory of 1720 2512 svchost.exe 36 PID 2512 wrote to memory of 1720 2512 svchost.exe 36 PID 2512 wrote to memory of 1720 2512 svchost.exe 36 PID 1744 wrote to memory of 1068 1744 taskeng.exe 38 PID 1744 wrote to memory of 1068 1744 taskeng.exe 38 PID 1744 wrote to memory of 1068 1744 taskeng.exe 38 PID 1744 wrote to memory of 1068 1744 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.521b06aa293edcd182bb96d327762360.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.521b06aa293edcd182bb96d327762360.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
C:\Windows\SysWOW64\at.exeat 19:51 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1848
-
-
C:\Windows\SysWOW64\at.exeat 19:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1720
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D89A737B-C685-45EC-88E5-00B978EDD88B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5ad63e74324ae2b541efd64efab9dc881
SHA16fa194826a64e0581a03f050b41b0c3bf39de8d2
SHA256bfb7cd34b3d9b24ddc8b8a36e7072077d28dd026e70f263e1ed19ee3c209c464
SHA512e6d998d6c5ad086c1610910adafdb5d4d8f221628dff64f6c1421176097c0d72ac8fc70934eb31ca4c69bd3548845313ed0fd2d8872b1f089b392a8f85cc7d36
-
Filesize
206KB
MD54dbca889eddbd40e6f985d7f2af1cd14
SHA1842e52797f5dd5d9ea8f044954e18869203875f2
SHA2562715b2abf70f9054bcf73a03b31993532d1e5f20b2f2210a9f624be7f79cd5b5
SHA512206f2ef52d571cb396e1695931f9e471897e2f64ecca6384954fa9db0090bc1e271de7a2eeb799e29cc481f9c522beae1fc490779b77b04a2eab44092ee7fd3b
-
Filesize
206KB
MD54dbca889eddbd40e6f985d7f2af1cd14
SHA1842e52797f5dd5d9ea8f044954e18869203875f2
SHA2562715b2abf70f9054bcf73a03b31993532d1e5f20b2f2210a9f624be7f79cd5b5
SHA512206f2ef52d571cb396e1695931f9e471897e2f64ecca6384954fa9db0090bc1e271de7a2eeb799e29cc481f9c522beae1fc490779b77b04a2eab44092ee7fd3b
-
Filesize
206KB
MD5040ad226fe977eb76f312326d7d7d406
SHA13d3cf9076d9896e561e4d06366614041e7e6c279
SHA25673e31f37d1dd3da47fe434bc64de8c9a9b7daa304cab93bf2f0361bfc621cd18
SHA512537254870eaa70d75e626df062319b3e65beb2163fa1b84e5ac94e39514fa321259c0913245a0d207427481f9e2bb9725eb40ad5e9bb7551bf18f816aaeb8461
-
Filesize
206KB
MD5040ad226fe977eb76f312326d7d7d406
SHA13d3cf9076d9896e561e4d06366614041e7e6c279
SHA25673e31f37d1dd3da47fe434bc64de8c9a9b7daa304cab93bf2f0361bfc621cd18
SHA512537254870eaa70d75e626df062319b3e65beb2163fa1b84e5ac94e39514fa321259c0913245a0d207427481f9e2bb9725eb40ad5e9bb7551bf18f816aaeb8461
-
Filesize
207KB
MD55febecce0aa3bb09403db92e1f1c4cc0
SHA195697d40dbe621610ec9caea5de633601eb23ad5
SHA2567d03fa89691a6e43b47caabb2f9ac217190cbbd81a6803ab6d88910198d0da7f
SHA51266013bcbe1634fe469a053e7c262257ce136e25351a0626dc812383053d0f72bd85a718d25aa399d148215c479147142a5c03b91097cfb6b439a09cfc5ba87fa
-
Filesize
207KB
MD55febecce0aa3bb09403db92e1f1c4cc0
SHA195697d40dbe621610ec9caea5de633601eb23ad5
SHA2567d03fa89691a6e43b47caabb2f9ac217190cbbd81a6803ab6d88910198d0da7f
SHA51266013bcbe1634fe469a053e7c262257ce136e25351a0626dc812383053d0f72bd85a718d25aa399d148215c479147142a5c03b91097cfb6b439a09cfc5ba87fa
-
Filesize
206KB
MD54dbca889eddbd40e6f985d7f2af1cd14
SHA1842e52797f5dd5d9ea8f044954e18869203875f2
SHA2562715b2abf70f9054bcf73a03b31993532d1e5f20b2f2210a9f624be7f79cd5b5
SHA512206f2ef52d571cb396e1695931f9e471897e2f64ecca6384954fa9db0090bc1e271de7a2eeb799e29cc481f9c522beae1fc490779b77b04a2eab44092ee7fd3b
-
Filesize
206KB
MD5040ad226fe977eb76f312326d7d7d406
SHA13d3cf9076d9896e561e4d06366614041e7e6c279
SHA25673e31f37d1dd3da47fe434bc64de8c9a9b7daa304cab93bf2f0361bfc621cd18
SHA512537254870eaa70d75e626df062319b3e65beb2163fa1b84e5ac94e39514fa321259c0913245a0d207427481f9e2bb9725eb40ad5e9bb7551bf18f816aaeb8461
-
Filesize
207KB
MD55febecce0aa3bb09403db92e1f1c4cc0
SHA195697d40dbe621610ec9caea5de633601eb23ad5
SHA2567d03fa89691a6e43b47caabb2f9ac217190cbbd81a6803ab6d88910198d0da7f
SHA51266013bcbe1634fe469a053e7c262257ce136e25351a0626dc812383053d0f72bd85a718d25aa399d148215c479147142a5c03b91097cfb6b439a09cfc5ba87fa
-
Filesize
206KB
MD54dbca889eddbd40e6f985d7f2af1cd14
SHA1842e52797f5dd5d9ea8f044954e18869203875f2
SHA2562715b2abf70f9054bcf73a03b31993532d1e5f20b2f2210a9f624be7f79cd5b5
SHA512206f2ef52d571cb396e1695931f9e471897e2f64ecca6384954fa9db0090bc1e271de7a2eeb799e29cc481f9c522beae1fc490779b77b04a2eab44092ee7fd3b
-
Filesize
206KB
MD54dbca889eddbd40e6f985d7f2af1cd14
SHA1842e52797f5dd5d9ea8f044954e18869203875f2
SHA2562715b2abf70f9054bcf73a03b31993532d1e5f20b2f2210a9f624be7f79cd5b5
SHA512206f2ef52d571cb396e1695931f9e471897e2f64ecca6384954fa9db0090bc1e271de7a2eeb799e29cc481f9c522beae1fc490779b77b04a2eab44092ee7fd3b
-
Filesize
206KB
MD5040ad226fe977eb76f312326d7d7d406
SHA13d3cf9076d9896e561e4d06366614041e7e6c279
SHA25673e31f37d1dd3da47fe434bc64de8c9a9b7daa304cab93bf2f0361bfc621cd18
SHA512537254870eaa70d75e626df062319b3e65beb2163fa1b84e5ac94e39514fa321259c0913245a0d207427481f9e2bb9725eb40ad5e9bb7551bf18f816aaeb8461
-
Filesize
206KB
MD5040ad226fe977eb76f312326d7d7d406
SHA13d3cf9076d9896e561e4d06366614041e7e6c279
SHA25673e31f37d1dd3da47fe434bc64de8c9a9b7daa304cab93bf2f0361bfc621cd18
SHA512537254870eaa70d75e626df062319b3e65beb2163fa1b84e5ac94e39514fa321259c0913245a0d207427481f9e2bb9725eb40ad5e9bb7551bf18f816aaeb8461
-
Filesize
206KB
MD5040ad226fe977eb76f312326d7d7d406
SHA13d3cf9076d9896e561e4d06366614041e7e6c279
SHA25673e31f37d1dd3da47fe434bc64de8c9a9b7daa304cab93bf2f0361bfc621cd18
SHA512537254870eaa70d75e626df062319b3e65beb2163fa1b84e5ac94e39514fa321259c0913245a0d207427481f9e2bb9725eb40ad5e9bb7551bf18f816aaeb8461
-
Filesize
206KB
MD5040ad226fe977eb76f312326d7d7d406
SHA13d3cf9076d9896e561e4d06366614041e7e6c279
SHA25673e31f37d1dd3da47fe434bc64de8c9a9b7daa304cab93bf2f0361bfc621cd18
SHA512537254870eaa70d75e626df062319b3e65beb2163fa1b84e5ac94e39514fa321259c0913245a0d207427481f9e2bb9725eb40ad5e9bb7551bf18f816aaeb8461
-
Filesize
207KB
MD55febecce0aa3bb09403db92e1f1c4cc0
SHA195697d40dbe621610ec9caea5de633601eb23ad5
SHA2567d03fa89691a6e43b47caabb2f9ac217190cbbd81a6803ab6d88910198d0da7f
SHA51266013bcbe1634fe469a053e7c262257ce136e25351a0626dc812383053d0f72bd85a718d25aa399d148215c479147142a5c03b91097cfb6b439a09cfc5ba87fa
-
Filesize
207KB
MD55febecce0aa3bb09403db92e1f1c4cc0
SHA195697d40dbe621610ec9caea5de633601eb23ad5
SHA2567d03fa89691a6e43b47caabb2f9ac217190cbbd81a6803ab6d88910198d0da7f
SHA51266013bcbe1634fe469a053e7c262257ce136e25351a0626dc812383053d0f72bd85a718d25aa399d148215c479147142a5c03b91097cfb6b439a09cfc5ba87fa