Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
3390785a04424cd630dc3192e5d17480_NEIKI.dll
Resource
win7-20240221-en
General
-
Target
3390785a04424cd630dc3192e5d17480_NEIKI.dll
-
Size
120KB
-
MD5
3390785a04424cd630dc3192e5d17480
-
SHA1
d4ea974461bd99f2363f44fa68a0c26cd9af6087
-
SHA256
172d8afa49d4cc38fcdf6e848f23988c9a7a174f02c27737faa398c574dd7d9e
-
SHA512
30419d5b931abc9094b1904a251c01507a3c784ae806813608fd8a9d64027aa5084aecd9fd77ff41ff96c335b74ef5694d67bb2b36e117ff237031e48bc475a5
-
SSDEEP
3072:Okg4ACKJmq6XDoTG/iWThbbtM7sN5LNEy+LkXc:Zg4Xk6zoTGa6hXSsXLp+LkXc
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76313e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76313e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76313e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f764cb9.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f764cb9.exe -
Executes dropped EXE 3 IoCs
pid Process 2816 f76313e.exe 2328 f763312.exe 804 f764cb9.exe -
Loads dropped DLL 6 IoCs
pid Process 1972 rundll32.exe 1972 rundll32.exe 1972 rundll32.exe 1972 rundll32.exe 1972 rundll32.exe 1972 rundll32.exe -
resource yara_rule behavioral1/memory/2816-17-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-19-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-21-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-23-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-22-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-20-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-18-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-16-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-15-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-13-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-58-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-59-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-60-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-61-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-62-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-64-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-65-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-79-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-80-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-83-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-84-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-102-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-93-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2816-147-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/804-164-0x00000000009B0000-0x0000000001A6A000-memory.dmp upx behavioral1/memory/804-201-0x00000000009B0000-0x0000000001A6A000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f764cb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f764cb9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f764cb9.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f764cb9.exe -
Enumerates connected drives 3 TTPs 16 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: f76313e.exe File opened (read-only) \??\J: f76313e.exe File opened (read-only) \??\N: f76313e.exe File opened (read-only) \??\O: f76313e.exe File opened (read-only) \??\P: f76313e.exe File opened (read-only) \??\Q: f76313e.exe File opened (read-only) \??\K: f76313e.exe File opened (read-only) \??\M: f76313e.exe File opened (read-only) \??\R: f76313e.exe File opened (read-only) \??\T: f76313e.exe File opened (read-only) \??\G: f76313e.exe File opened (read-only) \??\E: f764cb9.exe File opened (read-only) \??\E: f76313e.exe File opened (read-only) \??\H: f76313e.exe File opened (read-only) \??\L: f76313e.exe File opened (read-only) \??\S: f76313e.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f7631ab f76313e.exe File opened for modification C:\Windows\SYSTEM.INI f76313e.exe File created C:\Windows\f768621 f764cb9.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2816 f76313e.exe 2816 f76313e.exe 804 f764cb9.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 2816 f76313e.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe Token: SeDebugPrivilege 804 f764cb9.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1972 2780 rundll32.exe 28 PID 2780 wrote to memory of 1972 2780 rundll32.exe 28 PID 2780 wrote to memory of 1972 2780 rundll32.exe 28 PID 2780 wrote to memory of 1972 2780 rundll32.exe 28 PID 2780 wrote to memory of 1972 2780 rundll32.exe 28 PID 2780 wrote to memory of 1972 2780 rundll32.exe 28 PID 2780 wrote to memory of 1972 2780 rundll32.exe 28 PID 1972 wrote to memory of 2816 1972 rundll32.exe 29 PID 1972 wrote to memory of 2816 1972 rundll32.exe 29 PID 1972 wrote to memory of 2816 1972 rundll32.exe 29 PID 1972 wrote to memory of 2816 1972 rundll32.exe 29 PID 2816 wrote to memory of 1060 2816 f76313e.exe 18 PID 2816 wrote to memory of 1100 2816 f76313e.exe 19 PID 2816 wrote to memory of 1180 2816 f76313e.exe 21 PID 2816 wrote to memory of 2120 2816 f76313e.exe 23 PID 2816 wrote to memory of 2780 2816 f76313e.exe 27 PID 2816 wrote to memory of 1972 2816 f76313e.exe 28 PID 2816 wrote to memory of 1972 2816 f76313e.exe 28 PID 1972 wrote to memory of 2328 1972 rundll32.exe 30 PID 1972 wrote to memory of 2328 1972 rundll32.exe 30 PID 1972 wrote to memory of 2328 1972 rundll32.exe 30 PID 1972 wrote to memory of 2328 1972 rundll32.exe 30 PID 1972 wrote to memory of 804 1972 rundll32.exe 31 PID 1972 wrote to memory of 804 1972 rundll32.exe 31 PID 1972 wrote to memory of 804 1972 rundll32.exe 31 PID 1972 wrote to memory of 804 1972 rundll32.exe 31 PID 2816 wrote to memory of 1060 2816 f76313e.exe 18 PID 2816 wrote to memory of 1100 2816 f76313e.exe 19 PID 2816 wrote to memory of 1180 2816 f76313e.exe 21 PID 2816 wrote to memory of 2328 2816 f76313e.exe 30 PID 2816 wrote to memory of 2328 2816 f76313e.exe 30 PID 2816 wrote to memory of 804 2816 f76313e.exe 31 PID 2816 wrote to memory of 804 2816 f76313e.exe 31 PID 804 wrote to memory of 1060 804 f764cb9.exe 18 PID 804 wrote to memory of 1100 804 f764cb9.exe 19 PID 804 wrote to memory of 1180 804 f764cb9.exe 21 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76313e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f764cb9.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1060
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1100
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3390785a04424cd630dc3192e5d17480_NEIKI.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3390785a04424cd630dc3192e5d17480_NEIKI.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\f76313e.exeC:\Users\Admin\AppData\Local\Temp\f76313e.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\f763312.exeC:\Users\Admin\AppData\Local\Temp\f763312.exe4⤵
- Executes dropped EXE
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\f764cb9.exeC:\Users\Admin\AppData\Local\Temp\f764cb9.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:804
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5e6ba7c11db7aa6d66310540f6c46fae0
SHA1594062b347bbff9ee6a99fa243cd410c83416d33
SHA2562884320c73d2ea4e0a5e16a5e1c345e2d51904ac31e76ba673143e672a5f1afe
SHA512d18a493daef3ec8b0426178ea667117597a00b03e607645cd7571f92c0cb435f910fabb13adad6419ed2212fad144ec802d5e93875a98a02039045243956310c
-
Filesize
97KB
MD55dac88254c8274efeff8db39e9e1299d
SHA1ab892ba0678e9f0fb10b376623fe1f9d5cf6a87e
SHA256c66f7af36adf94f34c0081d50e63d82a3656bbd58a3c22de9efaa2bfede1a66b
SHA512c8497d927587ec3152fc5cd2e13a41db2b1ae8472e3b917b987cb035ec041b8bb8dd37ca94be714bd65defcb64eb463dbf034232e3083887a679b50150232762