Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/11/2023, 22:58

General

  • Target

    NEAS.3aa153304f53a2ea33e4c74a4ad07dd0.exe

  • Size

    211KB

  • MD5

    3aa153304f53a2ea33e4c74a4ad07dd0

  • SHA1

    620eb2916f6c484e6ddc95932e8ef7b3720a137f

  • SHA256

    91e8a25e056ef3d6d6c733170ba9ae92e2dac95866c2c7ef865eb97cf77b91b1

  • SHA512

    b16947b8f6b7558dc410657032722520dc9b7491045763ca071133b358904b15a795017d99adba66ea08843f2094951b137335456776a6e21f8fcbf81fc6af8a

  • SSDEEP

    3072:bDpM9Nvih5c9DE1pvAPXIHLfMgw7ySBL8PEAjAfIbAYGPJz6sPJBINFZ1Fqnj:b1iNKQxENHLfMgw7y9Zrs

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.3aa153304f53a2ea33e4c74a4ad07dd0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.3aa153304f53a2ea33e4c74a4ad07dd0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1124
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2088
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2148
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2912
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\mrsys.exe

    Filesize

    211KB

    MD5

    8d0be22ebb05ea65f863bb64204a6cef

    SHA1

    c122341fd3371abf5b03274c9f8d99d2b6aa5870

    SHA256

    da6c5820a48dd59e52dfe8798578ef919cdca107bf1a24acf2a723127e91a712

    SHA512

    89cb779d377d5ca957f364a22b0189cddbad50f65499b37e692c6c1058ed005711122eeafdc87ddf1775f0dfdb97e72250e9d1f133c7b1419719ed715922820c

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    bf98c56ad3f8de5e95ad2d96ec5040ac

    SHA1

    bd664c34695944cc25555e339801882dc6292add

    SHA256

    a09e736708fe2350bcb320c62a97cd2e96bb17ea3e3262bfeebe5d006fbac16b

    SHA512

    74a5527e6f879734905e0a3c137462b8d8bc97b258949ff05aa3566adf52afe7dd0c49231a5feaf9cdd5d2f096608af2dc63e4e50daa51ecd22e856d5ef715fa

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    bf98c56ad3f8de5e95ad2d96ec5040ac

    SHA1

    bd664c34695944cc25555e339801882dc6292add

    SHA256

    a09e736708fe2350bcb320c62a97cd2e96bb17ea3e3262bfeebe5d006fbac16b

    SHA512

    74a5527e6f879734905e0a3c137462b8d8bc97b258949ff05aa3566adf52afe7dd0c49231a5feaf9cdd5d2f096608af2dc63e4e50daa51ecd22e856d5ef715fa

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    bf98c56ad3f8de5e95ad2d96ec5040ac

    SHA1

    bd664c34695944cc25555e339801882dc6292add

    SHA256

    a09e736708fe2350bcb320c62a97cd2e96bb17ea3e3262bfeebe5d006fbac16b

    SHA512

    74a5527e6f879734905e0a3c137462b8d8bc97b258949ff05aa3566adf52afe7dd0c49231a5feaf9cdd5d2f096608af2dc63e4e50daa51ecd22e856d5ef715fa

  • C:\Windows\swchost.exe

    Filesize

    211KB

    MD5

    ef0365ab50e77ffb1909e9b70e1da8ea

    SHA1

    c7f44b8c9760928a637a4fee5cf10822de277746

    SHA256

    6ac0913f89985cc90eb168abfe8870708437882f142e85297bffae42b407eb56

    SHA512

    da0a4adf04df46733d2f8dd4d9de37763cf83fc56948786cdf76010804b5d7a426ec27980994402101819cae657d74d1667d7a75458883b8fcd54275c76a9d58

  • C:\Windows\userinit.exe

    Filesize

    211KB

    MD5

    cd91087c6edc548418660920086eede8

    SHA1

    8e8ef9ccd99cc279c31ceece9d1313b036ba0409

    SHA256

    a7446bcd64f37b0e214c2c6256a3da93a4a4e3ab19d9aa45fc7109ca8f710a13

    SHA512

    7211496cfe26db9b915d1c206af53820c97a35c97ef3a0721544bc76977c053f463e3f7f585f76bb6b92a288be20210cf3999b180166ec4a1bda8a68d6082bb7

  • \??\c:\windows\spoolsw.exe

    Filesize

    211KB

    MD5

    bf98c56ad3f8de5e95ad2d96ec5040ac

    SHA1

    bd664c34695944cc25555e339801882dc6292add

    SHA256

    a09e736708fe2350bcb320c62a97cd2e96bb17ea3e3262bfeebe5d006fbac16b

    SHA512

    74a5527e6f879734905e0a3c137462b8d8bc97b258949ff05aa3566adf52afe7dd0c49231a5feaf9cdd5d2f096608af2dc63e4e50daa51ecd22e856d5ef715fa

  • \??\c:\windows\swchost.exe

    Filesize

    211KB

    MD5

    ef0365ab50e77ffb1909e9b70e1da8ea

    SHA1

    c7f44b8c9760928a637a4fee5cf10822de277746

    SHA256

    6ac0913f89985cc90eb168abfe8870708437882f142e85297bffae42b407eb56

    SHA512

    da0a4adf04df46733d2f8dd4d9de37763cf83fc56948786cdf76010804b5d7a426ec27980994402101819cae657d74d1667d7a75458883b8fcd54275c76a9d58

  • \??\c:\windows\userinit.exe

    Filesize

    211KB

    MD5

    cd91087c6edc548418660920086eede8

    SHA1

    8e8ef9ccd99cc279c31ceece9d1313b036ba0409

    SHA256

    a7446bcd64f37b0e214c2c6256a3da93a4a4e3ab19d9aa45fc7109ca8f710a13

    SHA512

    7211496cfe26db9b915d1c206af53820c97a35c97ef3a0721544bc76977c053f463e3f7f585f76bb6b92a288be20210cf3999b180166ec4a1bda8a68d6082bb7