Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 21:42

General

  • Target

    0580e3a0d0b88d30e2e9a6c5e35a7ef0_NeikiAnalytics.exe

  • Size

    75KB

  • MD5

    0580e3a0d0b88d30e2e9a6c5e35a7ef0

  • SHA1

    dfaf39964055ad2a918d8cc7bdd0db25a2bc8c1e

  • SHA256

    44f48a4b415a5b4f287e3eb72524a8585aa425cb6fb644f6e2463f4821a3959c

  • SHA512

    1440335f35bf2fa934b60f2009c514544e66a387f8473f6fbc452ec47a78dd36a86acf36bb1acd422812ec8ea208359544ff453b6235fc1c51295ae26ff0714b

  • SSDEEP

    1536:8x1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3v:0OjWuyt0ZsqsXOKofHfHTXQLzgvnzHP3

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0580e3a0d0b88d30e2e9a6c5e35a7ef0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0580e3a0d0b88d30e2e9a6c5e35a7ef0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    95127c34cbc596f3e4689d3423414415

    SHA1

    20519aadbc2c563bd8370eea8a206a56e8367079

    SHA256

    d621e2331f6bfbf682bc9a566f8bc2086801c6f6a7f6270d168b5b45292bfb7a

    SHA512

    a64a715ee4da8aec6789fd80f749baed0a99b808d9e4198e85940d00ad4d77106fe3e1074de51d86e6c6f0e9db036316aebf6a42c9b7dcd9176ebba869730bda

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    75KB

    MD5

    c469ceca6b597d7b6b96b5588f330616

    SHA1

    f2957cbd45ddb92e3e853470ebf20b1026d90c4d

    SHA256

    cf44c061603e3f1e022496a15149de29a83c1417eaa371e35a351805c7fde65d

    SHA512

    75f86f32c5758bdcaaf184a474039df7aeff07a47f557bb59805d83f9f461c04ea5cea8ee878d3995928289c12968f755e14bd9c77ce3d8c7144ad3350de60b3

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    115bbe0767ed511396ea792519ec0353

    SHA1

    08390097242cc2851497dcf5d93b9c2733083339

    SHA256

    224e17f54a7c0fa828d859dd80d8cba6d2e25c46e589cc2a7d3b8444f2e030f5

    SHA512

    676b22be341bf82752faab7766fc8ae5327894b1aa78ef13fe0486633424f6a44df888c0c9f9d512456f4d94a398f44ddd9b9760207b8d4591f2eeeb80cbd21c

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    ca65c68c5343ff7b9a234d34f8b5532e

    SHA1

    43d2be2b461db94bd90e0717b4b670d34eab2c5a

    SHA256

    684c4c1f6978ff4445f2a262e2a8cdbeb8c91bbb9b814a2cf5e3c231a6884df2

    SHA512

    b3d716d7900ab86d2454baaa2d7b78cb215252912f6b92196611e03a93397767d8cccce7af8796044f7c132638b68f7c6ab4a576a365d4de9387492c5f216f0f

  • memory/2496-15-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2496-18-0x00000000002D0000-0x00000000002D9000-memory.dmp

    Filesize

    36KB

  • memory/2496-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2496-24-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2564-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2676-44-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-52-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-42-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2676-46-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-48-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-50-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-40-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-54-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-56-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-58-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-60-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-62-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-64-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2676-66-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB