Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 16:08 UTC

General

  • Target

    cd5a4d63b02368481081d9e0a41a3070_NeikiAnalytics.dll

  • Size

    761KB

  • MD5

    cd5a4d63b02368481081d9e0a41a3070

  • SHA1

    33bc63c4a1ca64dbec729eee892ca1870bdb1a1c

  • SHA256

    20e4e5ae7a38c885bf33a4729fe4006e5bb89725e0860391a0d11f6e571563e2

  • SHA512

    91fb4b95358742f417cc129c60302a5d9011d80aba489fda517e56e17c398183aa7f2a0f9d560faf9ed70dc54a28ba216dce100c3f4f41ae76eece1dbd4a0d61

  • SSDEEP

    12288:WnXUdQg9Jk6Jz5zqmm8pxQkO1V0YWSEi2gKguYa6A1OEjZKPU7eYPanJqlTHw:WXU1I6Jz5zqmm8c17H6ma6A1OENB7uMH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\cd5a4d63b02368481081d9e0a41a3070_NeikiAnalytics.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\cd5a4d63b02368481081d9e0a41a3070_NeikiAnalytics.dll
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\3ACF.tmp
        C:\Users\Admin\AppData\Local\Temp\3ACF.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3ACF.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • memory/2488-0-0x0000000000200000-0x0000000000247000-memory.dmp

    Filesize

    284KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.