Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:18
Behavioral task
behavioral1
Sample
NEAS.bae0fac75a078d31e24fec4c92025290.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.bae0fac75a078d31e24fec4c92025290.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.bae0fac75a078d31e24fec4c92025290.exe
-
Size
370KB
-
MD5
bae0fac75a078d31e24fec4c92025290
-
SHA1
6669d0df77789b88ee9e419756e4754a02ed6134
-
SHA256
920dfc7879b33498bae81b3d391b24830ee888bbe8ef4f7307a69d391493eb1a
-
SHA512
b1da20b1e8f1fdbde1f38d10ea6a98fa21857443cc8dd24fc19cca5aab35da8ae8a774eaccae3f8e6f33458652863fb75fb75f2638404d64ffa188fe5868475f
-
SSDEEP
6144:9bpGtfoVtScw2RCgrzItQB2bpGtfoVtScw:TGtAtScw3qEKBYGtAtScw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2992 WRDDN.EXE -
Loads dropped DLL 2 IoCs
pid Process 2960 NEAS.bae0fac75a078d31e24fec4c92025290.exe 2960 NEAS.bae0fac75a078d31e24fec4c92025290.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WRDDN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\IOJFPOB.EXE \"%1\" %*" WRDDN.EXE -
resource yara_rule behavioral1/memory/2960-0-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/files/0x00080000000120ca-16.dat upx behavioral1/files/0x00080000000120ca-17.dat upx behavioral1/memory/2992-24-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2960-25-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2960-23-0x0000000002050000-0x00000000020BE000-memory.dmp upx behavioral1/files/0x00080000000120ca-22.dat upx behavioral1/files/0x00080000000120ca-18.dat upx behavioral1/memory/2992-27-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/files/0x00080000000120ca-28.dat upx behavioral1/memory/2992-32-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-33-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-34-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-36-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-37-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-38-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-39-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-40-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-42-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-43-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2992-44-0x0000000000400000-0x000000000046E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RGWXR.EXE = "C:\\System Volume Information\\RGWXR.EXE" NEAS.bae0fac75a078d31e24fec4c92025290.exe -
Enumerates connected drives 3 TTPs 34 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\P: WRDDN.EXE File opened (read-only) \??\G: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\H: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\T: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\M: WRDDN.EXE File opened (read-only) \??\S: WRDDN.EXE File opened (read-only) \??\U: WRDDN.EXE File opened (read-only) \??\V: WRDDN.EXE File opened (read-only) \??\L: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\P: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\K: WRDDN.EXE File opened (read-only) \??\J: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\K: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\E: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\T: WRDDN.EXE File opened (read-only) \??\E: WRDDN.EXE File opened (read-only) \??\J: WRDDN.EXE File opened (read-only) \??\R: WRDDN.EXE File opened (read-only) \??\N: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\R: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\I: WRDDN.EXE File opened (read-only) \??\V: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\G: WRDDN.EXE File opened (read-only) \??\H: WRDDN.EXE File opened (read-only) \??\N: WRDDN.EXE File opened (read-only) \??\I: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\O: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\U: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\L: WRDDN.EXE File opened (read-only) \??\O: WRDDN.EXE File opened (read-only) \??\Q: WRDDN.EXE File opened (read-only) \??\M: NEAS.bae0fac75a078d31e24fec4c92025290.exe File opened (read-only) \??\S: NEAS.bae0fac75a078d31e24fec4c92025290.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\WRDDN.EXE NEAS.bae0fac75a078d31e24fec4c92025290.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\IOJFPOB.EXE WRDDN.EXE -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command NEAS.bae0fac75a078d31e24fec4c92025290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command NEAS.bae0fac75a078d31e24fec4c92025290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command NEAS.bae0fac75a078d31e24fec4c92025290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell NEAS.bae0fac75a078d31e24fec4c92025290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile NEAS.bae0fac75a078d31e24fec4c92025290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\$Recycle.Bin\\KUT.EXE \"%1\"" NEAS.bae0fac75a078d31e24fec4c92025290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\System Volume Information\\RGWXR.EXE %1" NEAS.bae0fac75a078d31e24fec4c92025290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\System Volume Information\\RGWXR.EXE \"%1\" %*" NEAS.bae0fac75a078d31e24fec4c92025290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WRDDN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\IOJFPOB.EXE \"%1\" %*" WRDDN.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file NEAS.bae0fac75a078d31e24fec4c92025290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open NEAS.bae0fac75a078d31e24fec4c92025290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command\ = "C:\\System Volume Information\\DIPDZ.EXE %1" NEAS.bae0fac75a078d31e24fec4c92025290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell NEAS.bae0fac75a078d31e24fec4c92025290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command NEAS.bae0fac75a078d31e24fec4c92025290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\$Recycle.Bin\\RFO.EXE %1" NEAS.bae0fac75a078d31e24fec4c92025290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open NEAS.bae0fac75a078d31e24fec4c92025290.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2992 WRDDN.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2992 2960 NEAS.bae0fac75a078d31e24fec4c92025290.exe 28 PID 2960 wrote to memory of 2992 2960 NEAS.bae0fac75a078d31e24fec4c92025290.exe 28 PID 2960 wrote to memory of 2992 2960 NEAS.bae0fac75a078d31e24fec4c92025290.exe 28 PID 2960 wrote to memory of 2992 2960 NEAS.bae0fac75a078d31e24fec4c92025290.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.bae0fac75a078d31e24fec4c92025290.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.bae0fac75a078d31e24fec4c92025290.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\WRDDN.EXE"C:\Program Files (x86)\WRDDN.EXE"2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD587e92eb717d4d8b2c4963046c4cb0bac
SHA165bd27dee9b96c2ea27072b3a2941a759c4107f2
SHA256902bd045db1b3f7f69ebb25a581604aa032a9d1c70cf1aa9f288a1fabcf77c74
SHA512e3b181e1fe23c6313ee6e8cbd49ea6fc87320900c1997516c25693586eb02ec50451795db672ea96ae103583d63bd36cffb86482cfcbd63a6ed4a6bbe9dc60a2
-
Filesize
370KB
MD587e92eb717d4d8b2c4963046c4cb0bac
SHA165bd27dee9b96c2ea27072b3a2941a759c4107f2
SHA256902bd045db1b3f7f69ebb25a581604aa032a9d1c70cf1aa9f288a1fabcf77c74
SHA512e3b181e1fe23c6313ee6e8cbd49ea6fc87320900c1997516c25693586eb02ec50451795db672ea96ae103583d63bd36cffb86482cfcbd63a6ed4a6bbe9dc60a2
-
Filesize
370KB
MD587e92eb717d4d8b2c4963046c4cb0bac
SHA165bd27dee9b96c2ea27072b3a2941a759c4107f2
SHA256902bd045db1b3f7f69ebb25a581604aa032a9d1c70cf1aa9f288a1fabcf77c74
SHA512e3b181e1fe23c6313ee6e8cbd49ea6fc87320900c1997516c25693586eb02ec50451795db672ea96ae103583d63bd36cffb86482cfcbd63a6ed4a6bbe9dc60a2
-
Filesize
318B
MD5d749be94c8afa6983d49c81ca40e653c
SHA12e7755a64ce95e7552fb236b7c8211a77776b204
SHA256e691a423a279d1d3d19d148795b3e44e7969a519dfb7f6b22a9be5469c066831
SHA512974818c0caf515cc072e8c8949f02fd7e264790aafa2777b8831c192f767a73e476eb59f4909dec43f358d7d89e04ef765e8690d7f2264f6013a371de045cfb9
-
Filesize
370KB
MD587e92eb717d4d8b2c4963046c4cb0bac
SHA165bd27dee9b96c2ea27072b3a2941a759c4107f2
SHA256902bd045db1b3f7f69ebb25a581604aa032a9d1c70cf1aa9f288a1fabcf77c74
SHA512e3b181e1fe23c6313ee6e8cbd49ea6fc87320900c1997516c25693586eb02ec50451795db672ea96ae103583d63bd36cffb86482cfcbd63a6ed4a6bbe9dc60a2
-
Filesize
370KB
MD587e92eb717d4d8b2c4963046c4cb0bac
SHA165bd27dee9b96c2ea27072b3a2941a759c4107f2
SHA256902bd045db1b3f7f69ebb25a581604aa032a9d1c70cf1aa9f288a1fabcf77c74
SHA512e3b181e1fe23c6313ee6e8cbd49ea6fc87320900c1997516c25693586eb02ec50451795db672ea96ae103583d63bd36cffb86482cfcbd63a6ed4a6bbe9dc60a2