Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 19:31

General

  • Target

    20099f19192b4c1f23787b4ed1e85d90_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    20099f19192b4c1f23787b4ed1e85d90

  • SHA1

    4645a9a88d58e099a489b60e793155e2d97414f4

  • SHA256

    2b2b456da3a812fa205f787262f07d715ea0fb9de36892a51c896973fe001d42

  • SHA512

    0f76fa90b770e8ee3af638eba81c1281bac88a1aeeb405f51686c40a3a99278c487fd2662b72a5da9130c9803a158450c6c2c1f35a86ec0b3648cd090a34970f

  • SSDEEP

    1536:vNyg8r8QN6mWrB5CmT7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:9B5CaJJjmLM3zRJWZsXy4Jt

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20099f19192b4c1f23787b4ed1e85d90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\20099f19192b4c1f23787b4ed1e85d90_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\pofet.exe
      "C:\Users\Admin\pofet.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\pofet.exe

    Filesize

    53KB

    MD5

    63b63983c76c617c16ce74a4dbab6271

    SHA1

    35316880feaedde552bbcc2a195589be3cae3b36

    SHA256

    e7fb0179bf4bb8ce64cdac213531dfa8d55c2782fc7a75602163334c94b7a44c

    SHA512

    79984c4cd043a27ad1be2f2cb3fcea714e1219203447aeb817a2b1e62185c24eb06b7ec3454d613315fa5bfcab9261ebd96c472fb167035dd9c1f46cb744e92f

  • memory/1200-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1200-9-0x0000000003950000-0x0000000003962000-memory.dmp

    Filesize

    72KB

  • memory/1200-18-0x0000000003950000-0x0000000003962000-memory.dmp

    Filesize

    72KB

  • memory/2572-19-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB