Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 16:52

General

  • Target

    154fa8c9e1e726c6ab588f42e8051e90_NeikiAnalytics.exe

  • Size

    66KB

  • MD5

    154fa8c9e1e726c6ab588f42e8051e90

  • SHA1

    c7b24b1919267764736bdb29913c6d6cccc413af

  • SHA256

    f8a266fe5a32ad3ab72fb5010961ca86335a4d67ea0d8ce2abc812c7498777a1

  • SHA512

    02f5eba16dd3b2ab0562ab2416bce0ae3dcdc3563c731a05abcd6d8ed4c03a02302b8db4e33f2e1ddc02c344c3345785021bb615ac80628e526a9b64886eb8e9

  • SSDEEP

    1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXip:IeklMMYJhqezw/pXzH9ip

Malware Config

Signatures

  • Detects BazaLoader malware 1 IoCs

    BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\154fa8c9e1e726c6ab588f42e8051e90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\154fa8c9e1e726c6ab588f42e8051e90_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2360
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:556
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3152
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4540
          • C:\Windows\SysWOW64\at.exe
            at 16:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2540
            • C:\Windows\SysWOW64\at.exe
              at 16:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:2272
              • C:\Windows\SysWOW64\at.exe
                at 16:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:3944

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          66KB

          MD5

          a64346f83b8494c5e91b208b3da9c1de

          SHA1

          ec4100d14207f8d8f042740355cbb78ef3c7d657

          SHA256

          5c630e52ff951f05e0fa2bff7f7c012faa4c7b6d7eea700888afb325d4e706fe

          SHA512

          7594d4339892b03775b8f22ad64afd9db815b1007f1812ab7daddce0b923b0cd40fe3ae06f90fa69cb9606cb3ac7b94c156ed6828ff58ebebed46f40d25f6850

        • C:\Windows\System\explorer.exe

          Filesize

          66KB

          MD5

          32c187196fb1bbad35150540ee6dd7a9

          SHA1

          bbf221a246c915da1bccbe450195a060cb5588fc

          SHA256

          ec88c921970f1920042efeefcfc36e9fa189c9bfc7785a9549e271caa7621d5f

          SHA512

          0a925c23c5a690650e9790e01c583b7f103fe67321b424355bfd28f11b1af7308dda34ba424c411b151e5d5346321168cc9ffda7180a733770391a88850fae75

        • C:\Windows\System\spoolsv.exe

          Filesize

          66KB

          MD5

          e90ce5ee89b2434f67ed822a4e823324

          SHA1

          88ce6853245226a8d67347c61d578fff7d30ac95

          SHA256

          5ad61381f336c126118f2f6acfe165154981cc556542e39602402a049f77c423

          SHA512

          0563a246bff31d852957a11b12a3238cbdebd210cb003e2e6cc00beea169615c348cdfaf992f1e090928f673aaddc59d431a023186fc294002726641e56a73f0

        • C:\Windows\System\svchost.exe

          Filesize

          66KB

          MD5

          05850085e9ad59f67b394dcb09fe3946

          SHA1

          4c9dab007eca25e3d264d82b1bcaf6cc6c13e586

          SHA256

          160b98d4b97e4ad75493ce25ea9b4892dcb6d7ce61a4ef4e5ad4100e7076c629

          SHA512

          7aa8b5ce44e3d699b7131d30ced4b15f1c4c8b55e212cea45ffea2ddc4c1257e1241b7a70849361029fe53b71c8efd17e47eb626de7d251cd5126f1c258c617c

        • memory/556-54-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/556-25-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/556-24-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/556-26-0x0000000074ED0000-0x000000007502D000-memory.dmp

          Filesize

          1.4MB

        • memory/2360-59-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2360-13-0x0000000074ED0000-0x000000007502D000-memory.dmp

          Filesize

          1.4MB

        • memory/2360-15-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2360-70-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2372-56-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2372-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2372-57-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/2372-6-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/2372-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

          Filesize

          16KB

        • memory/2372-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2372-2-0x0000000074ED0000-0x000000007502D000-memory.dmp

          Filesize

          1.4MB

        • memory/3152-40-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3152-36-0x0000000074ED0000-0x000000007502D000-memory.dmp

          Filesize

          1.4MB

        • memory/3152-61-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4540-43-0x0000000074ED0000-0x000000007502D000-memory.dmp

          Filesize

          1.4MB

        • memory/4540-46-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4540-50-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB