Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
7d04d9c582590db215169327b3c95170_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d04d9c582590db215169327b3c95170_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
7d04d9c582590db215169327b3c95170_NEAS.exe
-
Size
65KB
-
MD5
7d04d9c582590db215169327b3c95170
-
SHA1
16131d62ef948938e0b8afb72d581c90eaaa8996
-
SHA256
77fb0809e2c9f40140a30339dbe85b64a6ad86de52f965fd077a8e4151b965ad
-
SHA512
2fccddb1c541d3883229d36ee283fe169725fda95b1222e6c9ad5ccb2af23407b8195b6fac402722eb75db08880a5255bdd275f2a3e2d88ec710990ae865e264
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuB:7WNqkOJWmo1HpM0MkTUmuB
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/2704-56-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2788 explorer.exe 2504 spoolsv.exe 2704 svchost.exe 2616 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1664 7d04d9c582590db215169327b3c95170_NEAS.exe 1664 7d04d9c582590db215169327b3c95170_NEAS.exe 2788 explorer.exe 2788 explorer.exe 2504 spoolsv.exe 2504 spoolsv.exe 2704 svchost.exe 2704 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 7d04d9c582590db215169327b3c95170_NEAS.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1664 7d04d9c582590db215169327b3c95170_NEAS.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2704 svchost.exe 2788 explorer.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2788 explorer.exe 2704 svchost.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe 2704 svchost.exe 2788 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2788 explorer.exe 2704 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1664 7d04d9c582590db215169327b3c95170_NEAS.exe 1664 7d04d9c582590db215169327b3c95170_NEAS.exe 2788 explorer.exe 2788 explorer.exe 2504 spoolsv.exe 2504 spoolsv.exe 2704 svchost.exe 2704 svchost.exe 2616 spoolsv.exe 2616 spoolsv.exe 2788 explorer.exe 2788 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2788 1664 7d04d9c582590db215169327b3c95170_NEAS.exe 28 PID 1664 wrote to memory of 2788 1664 7d04d9c582590db215169327b3c95170_NEAS.exe 28 PID 1664 wrote to memory of 2788 1664 7d04d9c582590db215169327b3c95170_NEAS.exe 28 PID 1664 wrote to memory of 2788 1664 7d04d9c582590db215169327b3c95170_NEAS.exe 28 PID 2788 wrote to memory of 2504 2788 explorer.exe 29 PID 2788 wrote to memory of 2504 2788 explorer.exe 29 PID 2788 wrote to memory of 2504 2788 explorer.exe 29 PID 2788 wrote to memory of 2504 2788 explorer.exe 29 PID 2504 wrote to memory of 2704 2504 spoolsv.exe 30 PID 2504 wrote to memory of 2704 2504 spoolsv.exe 30 PID 2504 wrote to memory of 2704 2504 spoolsv.exe 30 PID 2504 wrote to memory of 2704 2504 spoolsv.exe 30 PID 2704 wrote to memory of 2616 2704 svchost.exe 31 PID 2704 wrote to memory of 2616 2704 svchost.exe 31 PID 2704 wrote to memory of 2616 2704 svchost.exe 31 PID 2704 wrote to memory of 2616 2704 svchost.exe 31 PID 2704 wrote to memory of 1492 2704 svchost.exe 32 PID 2704 wrote to memory of 1492 2704 svchost.exe 32 PID 2704 wrote to memory of 1492 2704 svchost.exe 32 PID 2704 wrote to memory of 1492 2704 svchost.exe 32 PID 2704 wrote to memory of 1776 2704 svchost.exe 36 PID 2704 wrote to memory of 1776 2704 svchost.exe 36 PID 2704 wrote to memory of 1776 2704 svchost.exe 36 PID 2704 wrote to memory of 1776 2704 svchost.exe 36 PID 2704 wrote to memory of 2148 2704 svchost.exe 38 PID 2704 wrote to memory of 2148 2704 svchost.exe 38 PID 2704 wrote to memory of 2148 2704 svchost.exe 38 PID 2704 wrote to memory of 2148 2704 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d04d9c582590db215169327b3c95170_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\7d04d9c582590db215169327b3c95170_NEAS.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
C:\Windows\SysWOW64\at.exeat 06:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1492
-
-
C:\Windows\SysWOW64\at.exeat 06:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1776
-
-
C:\Windows\SysWOW64\at.exeat 06:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2148
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD54fa6cbef1db77ab0c53e82870bb71247
SHA1a96664ce79e250f1a3855455896becfad93ed3b8
SHA256d0bf74235ae31e5067b742fe3fb54e037f54aea3af190969df0a9523edb837f0
SHA5122813a3456915d41e0e72e1fec391b2f71df03589bb52fdbefc14b638c609203f11729da32331b3ab280cfcd410c2100ff9b47ccca4c0b34d6a1572e3f6496ca0
-
Filesize
65KB
MD5b3593cea490d0a60d01c7101feadedee
SHA1240f9bb94203de961424ac7588d0c16acda8751f
SHA256341f2f29f154e4b826a37b1ba8be625ad3974a9d2a383c560bc9a0ece123afdb
SHA512e4bdec7956eb18af5a3de7516d1a9428b0b87aa401b2c90e87fd67f1f7af2e6584d26cc2183be6867ff8cf6b12f094c9966c4fe640c2fd52201fb44c4038c158
-
Filesize
65KB
MD55d25b34d9dae18757baedb7a9549ded4
SHA1ff02ab254b4b8ab159184d0b111ceb1f0d1c0db1
SHA25639f2f7565cf281afd6e175bb783926e54ff69cc5ddebe55fb8c555032650d85a
SHA5120104e2fd3c00a45551cddbac25553d9dd5e3ce81c9994617222ef4077b9fcec4e6af3bc9381dc27fa2e5221360089ee339fdd238b688050eb55956ffb87dde94
-
Filesize
65KB
MD575a5e93b1c2aeec74ea617dbf2ab9675
SHA183f332a37e5052e58ef0ff484a2edfa5324dac10
SHA25681b54f4e4b446f84f6a0ec85cf4d2e70299b1c6822b22e8abe6f82eec3f483b5
SHA512aafeadd4ed5e22a22cff4694b3155deef2351aed33635316afc5e021ae52b0724eeaa52f19b50814b056dd99d24f40ddc7dd3c1d85b7a94408af58d220699730