Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 11:57

General

  • Target

    2cb74394d8416eb30bd17c808e325020_NeikiAnalytics.exe

  • Size

    352KB

  • MD5

    2cb74394d8416eb30bd17c808e325020

  • SHA1

    af1d21c8bbdefd6243771480c89804a7de75cb6b

  • SHA256

    3c7346e1e562011176dcfde3456cc32cfcad4740bcf5035c3ada6720c8504bee

  • SHA512

    09fc21d2d6d93f2d6f3aaf9cd53af520ab153e42e31da64c91f015866f62f0993c6ab7c1c5657f1138d6b9e3fca813f43294691b76222dbd0757ae8e9bd22898

  • SSDEEP

    6144:LIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:eKofHfHTXQLzgvnzHPowYbvrjD/L7QPs

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cb74394d8416eb30bd17c808e325020_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2cb74394d8416eb30bd17c808e325020_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1896
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 1484
          4⤵
          • Program crash
          PID:3176
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1896 -ip 1896
    1⤵
      PID:1160

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ctfmen.exe

      Filesize

      4KB

      MD5

      43e31fe6a87cfda1453e100fa723e3c2

      SHA1

      e6ce36da7a41814702f605eb8ac485f4a340889c

      SHA256

      80e4bb8fd11491a6b55b15b1adadda944b5b2925043d8c3956675510027132b6

      SHA512

      a2587ca6e221ad1d6fa2835d80ccc4d900471d174641f2ed7197cb88a3c5ccee944a74dda667b84e13518b4e6dacff0fe9e0f96b5c8058a7296b48c589559c8d

    • C:\Windows\SysWOW64\grcopy.dll

      Filesize

      352KB

      MD5

      a24be5cdd0a61f004a74a063b9f94460

      SHA1

      ce530d50e41bba87efe8765b5fe8a59acc9ae14f

      SHA256

      864375750d0ca23a45e88d314be0771c4b7365b1f9716a5ca663e59467f46d24

      SHA512

      02184a2a45c9061b60533dc2eca681fe1b367d89d08d270c23e3102a5d236a61d3774c2ad01e31902b7fe72d842ef153b8f90d8c97463f26e32e2d21abc6cdd9

    • C:\Windows\SysWOW64\satornas.dll

      Filesize

      183B

      MD5

      8fba51ed14c13322f84caabd54cc9027

      SHA1

      2953dd3a4c0a6f48400536d0a00316563f05d496

      SHA256

      9f017d64a5109d5860bef4fc59804961f041f79913c27a534a7e497413453dc2

      SHA512

      d7a67a934087682bca3c62dd6e5447535057143b66c83d67b9b68887a5ffe5350310b65ec5ff996b9d80998d95a188e386f125cd2b6b7bc8a8fb108ade15f920

    • C:\Windows\SysWOW64\shervans.dll

      Filesize

      8KB

      MD5

      156213f33d3dccfc06700814164c336c

      SHA1

      dd10559a609d8daef0e24b038361aff87ae2df8f

      SHA256

      924bf9c4a4b113406231d8f91a5e7f79eeb539a09ac97cb5181781f9b56029e7

      SHA512

      056159bcb95269d8afd2e9f06428e7d95e1ded3e08752da416dd7b3270c1c07016cade4b5ece134d23cb3fb234f17ec871650c204137ddd81bc74960fbf15620

    • memory/1752-0-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/1752-18-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/1752-23-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/1752-24-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/1896-30-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/1896-37-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/1896-39-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/3120-26-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB