Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 06:09

General

  • Target

    7d04d9c582590db215169327b3c95170_NEAS.exe

  • Size

    65KB

  • MD5

    7d04d9c582590db215169327b3c95170

  • SHA1

    16131d62ef948938e0b8afb72d581c90eaaa8996

  • SHA256

    77fb0809e2c9f40140a30339dbe85b64a6ad86de52f965fd077a8e4151b965ad

  • SHA512

    2fccddb1c541d3883229d36ee283fe169725fda95b1222e6c9ad5ccb2af23407b8195b6fac402722eb75db08880a5255bdd275f2a3e2d88ec710990ae865e264

  • SSDEEP

    1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuB:7WNqkOJWmo1HpM0MkTUmuB

Malware Config

Signatures

  • Detects BazaLoader malware 1 IoCs

    BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d04d9c582590db215169327b3c95170_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\7d04d9c582590db215169327b3c95170_NEAS.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4712
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1988
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4416
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4916
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4624
          • C:\Windows\SysWOW64\at.exe
            at 06:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:1480
            • C:\Windows\SysWOW64\at.exe
              at 06:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1608
              • C:\Windows\SysWOW64\at.exe
                at 06:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:1444

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          65KB

          MD5

          9f3dbfc2613d44864a2bc47c9f365b4f

          SHA1

          ec30404c49ae1cde606441cb87058d0d74ffde00

          SHA256

          3e111f4c399c5e030eb279fa40a62eda43e6279ef2c242e2ae46fe0ef89e707a

          SHA512

          5b0d536057f99b29e29da110ead29e6e03392e5bd482ad9544273b4036a285d09c7caf9e7bef594294f177c2cff130b0aa62b02f3f5caf4b95c37047241437ea

        • C:\Windows\System\explorer.exe

          Filesize

          65KB

          MD5

          a62ab445405d81bdaa23d0814fca6a1b

          SHA1

          ae2f5fc8da8c310becd1a63ad9142b5765ed922b

          SHA256

          75573dd45b43f950b31866fe931e105b7063635ec78eaf08b8d8772afaa59f85

          SHA512

          b4cac0a538c938548e78bfe91614b6e75e1b7beb743fd8adfb6986c97c5ca9c260d980cfd4d4c15aa6a2c35216834ca19f18ebc2dc54dfb24dfa67cba56cb35e

        • C:\Windows\System\spoolsv.exe

          Filesize

          65KB

          MD5

          6e670fed5715c7bd1f863b4ee60b813d

          SHA1

          2573d0214e84218a8dd5f41ca2c64547c6b1e568

          SHA256

          9643895f3d21cdc6d18d5757d52f76c4f7b81ccab6c399fe8ae88c4129e5dcdb

          SHA512

          ea94e7fb705e1f13900ded659a6f4520ba94bb573dd48c21d7b24c5b2d06b24c0e96ecf3afbedb334986d790f7adfed901793d265a86de12ef8e39c63523ce71

        • C:\Windows\System\svchost.exe

          Filesize

          65KB

          MD5

          195384b266db180efd290de9c877786e

          SHA1

          2d3900e668baea5c8b6c6a99db3e69975f05c870

          SHA256

          85bf5a33004b388d99f0c57ae4511b145467d9fbf8d84c4cf9c23de1b49e609d

          SHA512

          430f10834cea3a16cf76cf7c9a0baa93970fc411383a216edb90498b99bd3c5846aa45f443a2cf1fabd0ee4a1139d7e191136a4abbec1850ff0840117198ce03

        • memory/1988-15-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1988-69-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1988-13-0x0000000075530000-0x000000007568D000-memory.dmp

          Filesize

          1.4MB

        • memory/1988-59-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4416-24-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4416-25-0x0000000075530000-0x000000007568D000-memory.dmp

          Filesize

          1.4MB

        • memory/4416-30-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4416-54-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4624-44-0x0000000075530000-0x000000007568D000-memory.dmp

          Filesize

          1.4MB

        • memory/4624-50-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4712-57-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/4712-55-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4712-56-0x00000000001D0000-0x00000000001D4000-memory.dmp

          Filesize

          16KB

        • memory/4712-5-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/4712-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4712-1-0x00000000001D0000-0x00000000001D4000-memory.dmp

          Filesize

          16KB

        • memory/4712-2-0x0000000075530000-0x000000007568D000-memory.dmp

          Filesize

          1.4MB

        • memory/4712-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4916-41-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4916-36-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4916-37-0x0000000075530000-0x000000007568D000-memory.dmp

          Filesize

          1.4MB

        • memory/4916-60-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB