Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 07:00

General

  • Target

    990c8438d183d7b0e83de90e658b3620_NeikiAnalytics.exe

  • Size

    431KB

  • MD5

    990c8438d183d7b0e83de90e658b3620

  • SHA1

    ecb25321206518c324d9fae3f3fce13eabe12a5b

  • SHA256

    9a5a2d3affee249a8d7b7e88d5160db66cc725a2c07328f4f1073c3a5b568861

  • SHA512

    811cea6be87e808649eba2ed7413be738fb53a92034f88a0b537e43718369f4746bca83ed467d9c7c321c87811b5c3887d7da90d329139e5d38b6349ce52f1b8

  • SSDEEP

    12288:eYOtWPmxG0x/WWTTOleWks8/G/8dfz/gw:+t0zwHT6lnNt8dfrg

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\990c8438d183d7b0e83de90e658b3620_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\990c8438d183d7b0e83de90e658b3620_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\sysnative\WindowsPowerShell\v1.0\powershell.exe -NoProfile -inputformat none -ExecutionPolicy ByPass -Command "&{Get-wmiobject win32_computersystem | FL model;}"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1644
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -inputformat none -ExecutionPolicy ByPass -File "C:\Users\Admin\AppData\Local\Temp\Output\DecryptAdvscpt.ps1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    88dbc4ea02d5955553aa0829b4633951

    SHA1

    cdcac352cbba1845bb4157214a8c915822514e50

    SHA256

    99ef7da23364302609c71345fc2524e8b7f2cf59e2dc50c3b794e61e68489e05

    SHA512

    56534d6f5c601d16400f61f3c6ecf9a823a37c90e80e4355b78959b2922fa301e938903a55b683b0c0beca0d0ead8b642bc3ffbd8b964637f9eeaeb04fa4d0a8

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_chdfg2km.pka.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\nsf46CE.tmp\INetC.dll

    Filesize

    21KB

    MD5

    2b342079303895c50af8040a91f30f71

    SHA1

    b11335e1cb8356d9c337cb89fe81d669a69de17e

    SHA256

    2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

    SHA512

    550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

  • C:\Users\Admin\AppData\Local\Temp\nsf46CE.tmp\IpConfig.dll

    Filesize

    114KB

    MD5

    a3ed6f7ea493b9644125d494fbf9a1e6

    SHA1

    ebeee67fb0b5b3302c69f47c5e7fca62e1a809d8

    SHA256

    ec0f85f8a9d6b77081ba0103f967ef6705b547bf27bcd866d77ac909d21a1e08

    SHA512

    7099e1bc78ba5727661aa49f75523126563a5ebccdff10cabf868ce5335821118384825f037fbf1408c416c0212aa702a5974bc54d1b63c9d0bcade140f9aae1

  • C:\Users\Admin\AppData\Local\Temp\nsf46CE.tmp\MachineInfos.dll

    Filesize

    1.0MB

    MD5

    38706940e5cd5ae61b35c05591ffb44c

    SHA1

    a0dd9bef49887ceaf3983055ee4955e572f13777

    SHA256

    e8c5bd7535ef06ff3c8c99455438c6982b8a414c43b7d1bb47c55506d4d7adcf

    SHA512

    e1328c481d82e59783515668a48a99b04aec75c4cc2d33e28a7d9a56f86ebcca7c3cbae4ee35b010724317ff9faa7d21770d17acede2bcfeec34366fc88945e4

  • C:\Users\Admin\AppData\Local\Temp\nsf46CE.tmp\System.dll

    Filesize

    11KB

    MD5

    fbe295e5a1acfbd0a6271898f885fe6a

    SHA1

    d6d205922e61635472efb13c2bb92c9ac6cb96da

    SHA256

    a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1

    SHA512

    2cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06

  • C:\Users\Admin\AppData\Local\Temp\nsf46CE.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    ab101f38562c8545a641e95172c354b4

    SHA1

    ec47ac5449f6ee4b14f6dd7ddde841a3e723e567

    SHA256

    3cdf3e24c87666ed5c582b8b028c01ee6ac16d5a9b8d8d684ae67605376786ea

    SHA512

    72d4b6dc439f40b7d68b03353a748fc3ad7ed10b0401741c5030705d9b1adef856406075e9ce4f1a08e4345a16e1c759f636c38ad92a57ef369867a9533b7037

  • C:\Users\Admin\AppData\Local\Temp\nsf46CE.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    50ba20cad29399e2db9fa75a1324bd1d

    SHA1

    3850634bb15a112623222972ef554c8d1eca16f4

    SHA256

    e7b145abc7c519e6bd91dc06b7b83d1e73735ac1ac37d30a7889840a6eed38fc

    SHA512

    893e053fcb0a2d3742e2b13b869941a3a485b2bda3a92567f84190cb1be170b67d20cc71c6a2cb92f4202140c8afd9c40a358496947d709e0c4b68d43a368754

  • C:\Users\Admin\AppData\Local\Temp\nsf46CE.tmp\nsJSON.dll

    Filesize

    22KB

    MD5

    c8222584e91b74c47f5ce2a84d1cdc4f

    SHA1

    750359dd536c840b1d4016826af7f34a8562e242

    SHA256

    6785ab17a6c27be18072aa1c274078321b4ea27bfa752d3c882ec3093dc4637b

    SHA512

    a89f0083c791e7d4d54fd728e848e44bd44ef9e11c799a48ab95a48d3c4e02e68699e28818c1232b694120973ac0c3e418740759830ef70d328d7ef9e5789f51

  • C:\Users\Admin\AppData\Local\Temp\nsf46CE.tmp\registry.dll

    Filesize

    24KB

    MD5

    2b7007ed0262ca02ef69d8990815cbeb

    SHA1

    2eabe4f755213666dbbbde024a5235ddde02b47f

    SHA256

    0b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d

    SHA512

    aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca

  • memory/1644-32-0x00007FFDB6C10000-0x00007FFDB76D1000-memory.dmp

    Filesize

    10.8MB

  • memory/1644-33-0x00007FFDB6C10000-0x00007FFDB76D1000-memory.dmp

    Filesize

    10.8MB

  • memory/1644-36-0x00007FFDB6C10000-0x00007FFDB76D1000-memory.dmp

    Filesize

    10.8MB

  • memory/1644-27-0x0000029AFF3A0000-0x0000029AFF3C2000-memory.dmp

    Filesize

    136KB

  • memory/1644-21-0x00007FFDB6C13000-0x00007FFDB6C15000-memory.dmp

    Filesize

    8KB

  • memory/3688-64-0x0000000004CF0000-0x0000000004D56000-memory.dmp

    Filesize

    408KB

  • memory/3688-63-0x0000000004C50000-0x0000000004C72000-memory.dmp

    Filesize

    136KB

  • memory/3688-62-0x0000000004FF0000-0x0000000005618000-memory.dmp

    Filesize

    6.2MB

  • memory/3688-65-0x0000000005620000-0x0000000005686000-memory.dmp

    Filesize

    408KB

  • memory/3688-75-0x0000000005690000-0x00000000059E4000-memory.dmp

    Filesize

    3.3MB

  • memory/3688-61-0x0000000002600000-0x0000000002636000-memory.dmp

    Filesize

    216KB

  • memory/3688-77-0x0000000005BF0000-0x0000000005C0E000-memory.dmp

    Filesize

    120KB

  • memory/3688-78-0x0000000005C30000-0x0000000005C7C000-memory.dmp

    Filesize

    304KB

  • memory/4640-42-0x0000000002990000-0x00000000029B6000-memory.dmp

    Filesize

    152KB

  • memory/4640-14-0x0000000002870000-0x0000000002984000-memory.dmp

    Filesize

    1.1MB