Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 19:38

General

  • Target

    301b92f66a94e8bf3b7f6c93dc761f30_NeikiAnalytics.exe

  • Size

    224KB

  • MD5

    301b92f66a94e8bf3b7f6c93dc761f30

  • SHA1

    8cf96e36787dd889b2e76e9f2ca4c559496346b9

  • SHA256

    f1d032fb99da003501008c140a2e991145472214f3b992f9e7dc88e0d9e667b7

  • SHA512

    07023d0091a11c3cbff57ff68a8203fed0bfa81132d55ff748aa6f1bbd455ae101462282c40aac14996febe840552b0782ad05b9f3518729c6c61dad0b4bf815

  • SSDEEP

    6144:0Is9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZy:VKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\301b92f66a94e8bf3b7f6c93dc761f30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\301b92f66a94e8bf3b7f6c93dc761f30_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 824
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    01ce0e90d380d622d8212adab18a1d50

    SHA1

    5441c927b5f73dc312c28bc8d65d2ce0c37b5a65

    SHA256

    2fe991510954092bc4e1fd533d11fa82b480053cdc8701b67d0fe085141f2b1f

    SHA512

    739fbe611dee3c8d3dbd98c6c5fd7829d0db0d2a35d8b385f0dfcb8d5fef0a8e7b4b5ddf134e1667710bc8b9859fed310c2a7849e7d3fdf246b8c52b48b7caa0

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    6819a29dfbd1e49ae66b7061269fee7a

    SHA1

    edfa624b0531fd5b0f1d2caa583dc467633d4ea2

    SHA256

    50a2ba00b6fe03fb94ca518e90aad8b689b8cfca69328ec5aced964e09055449

    SHA512

    dd5cc274d19fe401fe62aa525f3c91d8b4269391528e7e9256bc52d46ad7ebeb851c60b1b3522338b5191d4c6d1bf4a3cea67a601ce1ad4071aef3863a847e11

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    f172f0870cb48c141b9281060b3700b1

    SHA1

    1c2d3b4821d872bb728ae989594ab8024945561d

    SHA256

    7899d0f99d279c32a3b21176e2034fbefed42ed78ab46d578cd19d100479673b

    SHA512

    6fc497ec714056f9cd6933a70f8ec50ddcd2872c2ad54c77d11e089f4ddfce68e41ae0644f06e2b58a1a1b3a7cebc3d60918b76fa2167777e92e892e0d16376c

  • \Windows\SysWOW64\smnss.exe

    Filesize

    224KB

    MD5

    82c0bf3dc3a8f05e41cadfe0ddfcf563

    SHA1

    5332fbb1220c6d6670d201a48da5ae8e07caa0fb

    SHA256

    4cd736ae9c4c096921d554ac6c7a20a903a259ec2749e65d432f976d321a8994

    SHA512

    dd45c366ad66dc5688d4251f922ac7315baea6fa98969e041495cb74969f78ef4f43af63f91a9feef3b4f87c2729a60ddd6c3219618de57485c4f4c03ef00b6d

  • memory/2204-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2204-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2204-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2204-1-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2648-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2648-34-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2648-30-0x0000000000340000-0x0000000000372000-memory.dmp

    Filesize

    200KB

  • memory/2756-35-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2756-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2756-48-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB