Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
13/11/2023, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0d7930d81211efd5eadd96802a8d01e0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.0d7930d81211efd5eadd96802a8d01e0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.0d7930d81211efd5eadd96802a8d01e0.exe
-
Size
472KB
-
MD5
0d7930d81211efd5eadd96802a8d01e0
-
SHA1
ac54d2753e0d5cd3d8dc7b8c1f41f58ffa65b2fa
-
SHA256
73d637debd43f39f191e41a8dfb330ab707177bb6f71d98aa9582b7f930adb4f
-
SHA512
b5b6f3fd86c512bbfa673e3aa07c58dcba4e650691744d797de77d6c4070971c1984fbe0386b693da85e749afd006ea526408aceb864101adb2aec4cff1e66d7
-
SSDEEP
6144:cf+Jjjou35J6i5plrzuo6/LkeYvjoIHnv0RX/VwFdLD/7MsrYMC+9GXL9M8sG3du:bj8u3ui5pl+uBvc/V0FdYxJdRqMy
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2076 LSASS.exe 2740 LSASS.exe -
Loads dropped DLL 2 IoCs
pid Process 2076 LSASS.exe 2076 LSASS.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: LSASS.exe File opened (read-only) \??\E: LSASS.exe File opened (read-only) \??\I: LSASS.exe File opened (read-only) \??\M: LSASS.exe File opened (read-only) \??\P: LSASS.exe File opened (read-only) \??\T: LSASS.exe File opened (read-only) \??\L: LSASS.exe File opened (read-only) \??\O: LSASS.exe File opened (read-only) \??\Q: LSASS.exe File opened (read-only) \??\U: LSASS.exe File opened (read-only) \??\V: LSASS.exe File opened (read-only) \??\X: LSASS.exe File opened (read-only) \??\Y: LSASS.exe File opened (read-only) \??\G: LSASS.exe File opened (read-only) \??\H: LSASS.exe File opened (read-only) \??\N: LSASS.exe File opened (read-only) \??\R: LSASS.exe File opened (read-only) \??\S: LSASS.exe File opened (read-only) \??\Z: LSASS.exe File opened (read-only) \??\J: LSASS.exe File opened (read-only) \??\K: LSASS.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf LSASS.exe File created C:\autorun.inf LSASS.exe File opened for modification C:\autorun.inf LSASS.exe File created F:\autorun.inf LSASS.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\LSASS.exe NEAS.0d7930d81211efd5eadd96802a8d01e0.exe File opened for modification C:\Windows\LSASS.exe NEAS.0d7930d81211efd5eadd96802a8d01e0.exe File opened for modification C:\Windows\LSASS.exe LSASS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 2380 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2740 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe 2076 LSASS.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2076 2380 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 28 PID 2380 wrote to memory of 2076 2380 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 28 PID 2380 wrote to memory of 2076 2380 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 28 PID 2380 wrote to memory of 2076 2380 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 28 PID 2076 wrote to memory of 2580 2076 LSASS.exe 29 PID 2076 wrote to memory of 2580 2076 LSASS.exe 29 PID 2076 wrote to memory of 2580 2076 LSASS.exe 29 PID 2076 wrote to memory of 2580 2076 LSASS.exe 29 PID 2076 wrote to memory of 2608 2076 LSASS.exe 30 PID 2076 wrote to memory of 2608 2076 LSASS.exe 30 PID 2076 wrote to memory of 2608 2076 LSASS.exe 30 PID 2076 wrote to memory of 2608 2076 LSASS.exe 30 PID 2076 wrote to memory of 2740 2076 LSASS.exe 33 PID 2076 wrote to memory of 2740 2076 LSASS.exe 33 PID 2076 wrote to memory of 2740 2076 LSASS.exe 33 PID 2076 wrote to memory of 2740 2076 LSASS.exe 33 PID 2076 wrote to memory of 2192 2076 LSASS.exe 34 PID 2076 wrote to memory of 2192 2076 LSASS.exe 34 PID 2076 wrote to memory of 2192 2076 LSASS.exe 34 PID 2076 wrote to memory of 2192 2076 LSASS.exe 34 PID 2076 wrote to memory of 2932 2076 LSASS.exe 35 PID 2076 wrote to memory of 2932 2076 LSASS.exe 35 PID 2076 wrote to memory of 2932 2076 LSASS.exe 35 PID 2076 wrote to memory of 2932 2076 LSASS.exe 35 PID 2076 wrote to memory of 1712 2076 LSASS.exe 40 PID 2076 wrote to memory of 1712 2076 LSASS.exe 40 PID 2076 wrote to memory of 1712 2076 LSASS.exe 40 PID 2076 wrote to memory of 1712 2076 LSASS.exe 40 PID 2076 wrote to memory of 2044 2076 LSASS.exe 42 PID 2076 wrote to memory of 2044 2076 LSASS.exe 42 PID 2076 wrote to memory of 2044 2076 LSASS.exe 42 PID 2076 wrote to memory of 2044 2076 LSASS.exe 42 PID 2076 wrote to memory of 1136 2076 LSASS.exe 44 PID 2076 wrote to memory of 1136 2076 LSASS.exe 44 PID 2076 wrote to memory of 1136 2076 LSASS.exe 44 PID 2076 wrote to memory of 1136 2076 LSASS.exe 44 PID 2076 wrote to memory of 2392 2076 LSASS.exe 45 PID 2076 wrote to memory of 2392 2076 LSASS.exe 45 PID 2076 wrote to memory of 2392 2076 LSASS.exe 45 PID 2076 wrote to memory of 2392 2076 LSASS.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0d7930d81211efd5eadd96802a8d01e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0d7930d81211efd5eadd96802a8d01e0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\LSASS.exe"C:\Windows\LSASS.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:2580
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:2608
-
-
C:\Users\Admin\LSASS.exe"C:\Users\Admin\LSASS.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:2192
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:2932
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:1712
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:2044
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:1136
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:2392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD54968a69f1fc56e0c4335ad8579eeb0b3
SHA10114a51261f01420ac1aade1475929a106fcd3be
SHA2567a057bca5d2df91f28675115cf363a541d3bbe6fb74a0bd2df3c209c924183a0
SHA512e2dcefc63f1353cc30bc3ed05e0db488024f4102cf62dfe28c76914bce396a82ab05cb6ad7ddb7e7cc26a53f1b9ee15a815039570dfc86858a2a16d706f5d545
-
Filesize
472KB
MD5b0d8ab28bb6db905bcb5e4019494be07
SHA122683e43ce65c29df75f7e5f20e598b32255fa7a
SHA256f78fa3a9ca54224170b4497cb4437f7e761e2477f6cc12dbda7639eb4e270164
SHA512df702b4b8594186850396dbfcb1cd18d287bbf2bd83dc9cf29a395bb012d82cb49f856cfc6c767db17bea39794922cadf97fe1a61a5a5e5b12255fa1b208b219
-
Filesize
472KB
MD5b0d8ab28bb6db905bcb5e4019494be07
SHA122683e43ce65c29df75f7e5f20e598b32255fa7a
SHA256f78fa3a9ca54224170b4497cb4437f7e761e2477f6cc12dbda7639eb4e270164
SHA512df702b4b8594186850396dbfcb1cd18d287bbf2bd83dc9cf29a395bb012d82cb49f856cfc6c767db17bea39794922cadf97fe1a61a5a5e5b12255fa1b208b219
-
Filesize
472KB
MD5b0d8ab28bb6db905bcb5e4019494be07
SHA122683e43ce65c29df75f7e5f20e598b32255fa7a
SHA256f78fa3a9ca54224170b4497cb4437f7e761e2477f6cc12dbda7639eb4e270164
SHA512df702b4b8594186850396dbfcb1cd18d287bbf2bd83dc9cf29a395bb012d82cb49f856cfc6c767db17bea39794922cadf97fe1a61a5a5e5b12255fa1b208b219
-
Filesize
190B
MD5b1445c7f646c6ca9a7597791af38d575
SHA191efaf63fa1f7a51ee2f9b1c3b0f8932f15439ce
SHA256220517d50470c86d94020cebcd03af286898e65338f468dc5f860dc04af2c88e
SHA512533349278b6d186f0f3947681e90dcc7f617e146736798e6fc23e79d61610f1f7b2e4b4241b296884622fbd6b1cf73dc694a852e05bf4235da8ed40b70c5683f
-
Filesize
472KB
MD54968a69f1fc56e0c4335ad8579eeb0b3
SHA10114a51261f01420ac1aade1475929a106fcd3be
SHA2567a057bca5d2df91f28675115cf363a541d3bbe6fb74a0bd2df3c209c924183a0
SHA512e2dcefc63f1353cc30bc3ed05e0db488024f4102cf62dfe28c76914bce396a82ab05cb6ad7ddb7e7cc26a53f1b9ee15a815039570dfc86858a2a16d706f5d545
-
Filesize
472KB
MD54968a69f1fc56e0c4335ad8579eeb0b3
SHA10114a51261f01420ac1aade1475929a106fcd3be
SHA2567a057bca5d2df91f28675115cf363a541d3bbe6fb74a0bd2df3c209c924183a0
SHA512e2dcefc63f1353cc30bc3ed05e0db488024f4102cf62dfe28c76914bce396a82ab05cb6ad7ddb7e7cc26a53f1b9ee15a815039570dfc86858a2a16d706f5d545