Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 20:09

General

  • Target

    1c38cd24ba7037872b4af4a6f9a56ee0_NeikiAnalytics.exe

  • Size

    82KB

  • MD5

    1c38cd24ba7037872b4af4a6f9a56ee0

  • SHA1

    7ddaf91cdba9d05beaf63f0a67b619510b1e8c6a

  • SHA256

    8a78df15f0c83a823f8717809151e97b27c56928b7ee36d34d616ca80be76aea

  • SHA512

    46be882ac600cbbe52c325f4bb44ae2be078e1ebf15650550361fe8727d65c45ab293901f9f7841829083d0d9369c67799ecc84de273a8d1ea9b499735dde118

  • SSDEEP

    1536:4aiqH1s+kCtrA2UMT0mTFibDKa1XkHnsvxLDZZf+J:51B31bdBob2QXacxvX+J

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c38cd24ba7037872b4af4a6f9a56ee0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1c38cd24ba7037872b4af4a6f9a56ee0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX370A.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    88KB

    MD5

    7928599057c2cd143e69169a1a77960a

    SHA1

    2fde7ca3edf4528a26f25ca248c2224d0184dac9

    SHA256

    d6c63b9cc4efb43419863a1e2b0b1aa5977e7ff815394f4aef591352e9a6c5b8

    SHA512

    5f0573e74d84d63cbe82ff0cfa66efed6be2396f1cd0941545bd015e4f358c916eae6af91e8c50f49c0be4a44de38f5eb23676107bdd74f86d5a2c37cc9d2c3a

  • memory/1848-104-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-105-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-100-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-101-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-102-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-103-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-98-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-99-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-106-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-107-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-108-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-109-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-110-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1848-111-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB