Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 04:10

General

  • Target

    78e599d4cfd9f35921d6170a7f4c4080_NeikiAnalytics.exe

  • Size

    213KB

  • MD5

    78e599d4cfd9f35921d6170a7f4c4080

  • SHA1

    42962b2d8a3021b60d163d7fba5bedc12278ea45

  • SHA256

    4984fe984e7cd1d8fee19cb6f8397c577ec01eb8bdddcc87a3bc0fc4ac7f0812

  • SHA512

    be25727f2f07c59ad4e48059972b597090ab55beac3cfbd191980cae066663ecaee4f377e5b7e0ef66dc9a6711f63235672d140bcadf2d2cf3b28c31486e2cdb

  • SSDEEP

    6144:nu++Jbojf5Vq5OC4qZhZcKYhc/ZfUozY:n+cff22qZhZcKYhc/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78e599d4cfd9f35921d6170a7f4c4080_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\78e599d4cfd9f35921d6170a7f4c4080_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\galynuh.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    a03781724ecdd5242c08b938a5c54477

    SHA1

    4e6e7e284afb9b501901458d4f8ab38cef577460

    SHA256

    36989713264120f98b597cc32c842e4a09246fa91bc7a94c01cc1e6a2d0c5271

    SHA512

    81cbddbd712851e01d0c3b705a1aafb8e4f2d5d7c03552f15dd29c01a0270e946dda767fa2e6d04aa65d0aa183e091df93ca7a4474ef3334a1ccd31c8b62acdb

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    1KB

    MD5

    a56390ac3a4117114a6cc18c0bbd51e7

    SHA1

    0ce8314a9b3e186af46ef23f26a85e1c65a90385

    SHA256

    a4d7cb2103b415a0267c7fc440be95a1d586ea04c104664000f7c09d39ee5f5f

    SHA512

    54a5efb35febdc7a50502c4b85a8c6efa05626fc0b9634b2dc86b9e9a358801c59c963301d115f3394a9a3c019300279790e2d71fc82b5157698c5ae7a594a87

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    1KB

    MD5

    6067ca924df5692f6d84f2258d6f1cc7

    SHA1

    a5e08d3c9e0cc68c8f825c51fe7b6eda16cfe01b

    SHA256

    34a71921d7cb5fa26e3fc516bfb48b9887e057bd9396a90655e965a53dbef761

    SHA512

    b5a64937fbc155207b586362a99ee7834e655b517022a53cc31a09dba37b7d610d2348bfba5fd37ed069d7974e0d9397843f56adf0ba8d3826081847b53573b4

  • C:\Program Files (x86)\Windows Defender\pupydeq.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26c549967a422136860b6a7984f266e3

    SHA1

    73a71bc2c3f5fd24b5d0dd076f13bc668a50fefd

    SHA256

    d340a9c0d876ff6fd0ecb1cc3a33c2e20aee535c8009fa6d95c20953e840a00e

    SHA512

    6891d44eecb717d6c1927152dd6fca801227ebe38b0aabb276ee02a6d47252500ecc83b398b8f80f7a194361818dd2703d91e7ccb3609a8c9c45c6a2ee60b2ff

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\login[2].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\login[2].htm

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SVBQZB4R\login[4].htm

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\Cab4AE7.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar4AFA.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Windows\AppPatch\svchost.exe

    Filesize

    213KB

    MD5

    b4470b6a66da799c57422ec557790fe3

    SHA1

    862c0a87b3f6305fed7563d74077d209ff10f216

    SHA256

    62d7e79c3959e9c8b6b08e09695dd6a6e62ba2fb8a2ff5fb46ae5f31cf477c70

    SHA512

    6b135b05abf9e81bf68a3eed6cae6bf84e12a54f14803471b8ec5a2cc06e22b230f86a9c0d4715f30cc131cf37a2882037549b06331de881fbd97d737eb64960

  • memory/1284-71-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-63-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-30-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/1284-28-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/1284-26-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/1284-39-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-41-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-37-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-43-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-51-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-67-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-87-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-86-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-85-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-84-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-83-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-82-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-81-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-80-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-79-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-78-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-77-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-76-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-75-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-74-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-72-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-36-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/1284-70-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-69-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-68-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-66-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-65-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-64-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-32-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/1284-62-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-61-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-60-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-59-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-58-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-56-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-55-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-54-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-53-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-73-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-52-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-50-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-49-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-48-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-47-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-57-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-46-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-45-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-44-0x0000000000670000-0x0000000000722000-memory.dmp

    Filesize

    712KB

  • memory/1284-34-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/1284-23-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/1284-20-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/1284-24-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/1284-35-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2792-1-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2792-0-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2792-2-0x00000000002E0000-0x000000000032F000-memory.dmp

    Filesize

    316KB

  • memory/2792-3-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2792-12-0x00000000004A0000-0x0000000000534000-memory.dmp

    Filesize

    592KB

  • memory/2792-22-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2792-21-0x00000000002E0000-0x000000000032F000-memory.dmp

    Filesize

    316KB

  • memory/2792-19-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB