Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 16:26

General

  • Target

    2d9c42e47bc97fbaa36a6f84910fd860_NeikiAnalytics.exe

  • Size

    240KB

  • MD5

    2d9c42e47bc97fbaa36a6f84910fd860

  • SHA1

    2e6b3d03d1c3ef12d5bbf4991adc9ab02cd2960c

  • SHA256

    1f00f8a2dee7a3e882016aede44f6011ab2981d95ecfc7ffc78a8e5bd7f4b804

  • SHA512

    c89b57d69ca3a5474a42f61d83c9d8b057edda25d07f772cf600cffa4a7d16f2d178aedb0163d220c847e167b56ed0bead8c2116303fb1be9cc4cd1e124f29b3

  • SSDEEP

    1536:xq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bB:xq5ud9qHFO8Kf3rIIbB

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d9c42e47bc97fbaa36a6f84910fd860_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2d9c42e47bc97fbaa36a6f84910fd860_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    8441e39a00a6a2736cac290a2e227f32

    SHA1

    5d48db3ef08fec15d9442fc5a54773267425f3a1

    SHA256

    69a0ad73f9174a66e5a3278b14217e1aa8600fbbccc0edb60cc55299f72f8f79

    SHA512

    e7bc1a6dff85e1e9665514b205b230c3abe56a74fd73adf3680433066e3b4da75a1c239d1cf240c46841fb3e512f995b380451f6be32bec9e025db671984471b

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    240KB

    MD5

    dccd644b15a7c257f089c91879574c3c

    SHA1

    2755e1c5656c8d870e175738323c6a4a222faefb

    SHA256

    9406c8a17e82cadcb6d1185fcae35af8639484c17ce7f0b19fa625694bc8ecaf

    SHA512

    47616de93ab7825ab4b66d7ee5ca56f02b42766d13a8a272faa91a90eca73f25c7b2e6523f776b3e00a8b4239f88ce82955d246c105bda2410e92b1dc9463c39

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    ede95dc5d9ad0130ce6be53f25e5e42c

    SHA1

    0f0413909c11c6aadc8d2d9d9ea88e9c398ebf14

    SHA256

    055c473f23e78dcdc0d6e57ce2efbdd9cd853f0340bb68f0d3d8e8095cde0203

    SHA512

    1a309488efe2ac31a5027e2fc6f1a583882d62334193d7877150bc2b9a496438adf1a7055498e3fef27d51e9f509a1d76f56761f70f93f1d6eada4a0b52b3e28

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    ae0350cd586ab9aad9e957ef0249590e

    SHA1

    5373a95bb374b91c7538d654825eb5addbc8466b

    SHA256

    232aee15d6095c3376385be900b5f746fc946cd1f6a1a909046d4f116c307328

    SHA512

    054ff050528431c164066f974167ade16ec31949d16a72641fb6f24bd5d5c85f02db178c5cab06f8fa55ee4b96db18fd29029c49a1df2d0d6b10d0779990eaf9

  • memory/2852-18-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2852-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2852-23-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2852-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3864-26-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3864-30-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4136-40-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-50-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-31-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-42-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-44-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-46-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-48-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4136-52-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-54-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-56-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-58-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-60-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-62-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-64-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4136-66-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB