Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 23:54

General

  • Target

    5d8ad6f99e3a5dfce870f60ceb879410_NeikiAnalytics.exe

  • Size

    119KB

  • MD5

    5d8ad6f99e3a5dfce870f60ceb879410

  • SHA1

    abe4f368d76d3e4926615cd2818ba3ed8a88f4e8

  • SHA256

    0b278aead63f82b1bf4f3748a50bfc58eb495ffc9562c77c0ba3ec7d37fdab6e

  • SHA512

    ff19bc7c3976d732d642782ee0df08ca435b7deb2fa4e88283cccb56b30f716afd250e7c6548b2cecc4f242c1343cb85193b3bb67b4ee1bf7113a1c7827d0684

  • SSDEEP

    3072:0OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:0Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d8ad6f99e3a5dfce870f60ceb879410_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5d8ad6f99e3a5dfce870f60ceb879410_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1484
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4024 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ctfmen.exe

      Filesize

      4KB

      MD5

      dac06aeca8e7da946e9a0f742509486b

      SHA1

      098b02b0669b2922242d86e03a3e047d2bd589a8

      SHA256

      9ca3d1c3f25e3b32d602cb2b0efec4828a4ae3187aff942277d1c1f91e2ac26d

      SHA512

      912f3cbe3d44354e3be0d9b04f4c34ed70908d15274ddf0e445d89257450f8e6e1744a30ea71bef09a2f90b420134e0629c69786910a61b80f582f5946188c92

    • C:\Windows\SysWOW64\grcopy.dll

      Filesize

      119KB

      MD5

      7d167cda6b4ed98e2b32b66df61344b0

      SHA1

      df09e078f7e58a427ef8a3a9e9993522d9a67653

      SHA256

      f8f532aa4341d4053dff69577349422198682e5a199ea90277f5b0aadeeb6d33

      SHA512

      7b2c91d42f4ef30c75eecad7e82d4a725c44c9781c59b9ab76f65c1969972eda615b57cb82fb3e5ebd85b6bec8204d99f74ba3f8e4593ee0e93d82c1d2d1fdef

    • C:\Windows\SysWOW64\satornas.dll

      Filesize

      183B

      MD5

      e5ea4d52eb88f73795ccb7c86c1a4352

      SHA1

      88af09eaa0f9c4d76e4a410ea707a6ede964ee1f

      SHA256

      0357253a7a3c236bb03a31e04bdbff646971af4e544b5b73f6e339147f4e067f

      SHA512

      5a20ff59c995a827649b11f449d2f478ab4e2f178d7bc9cedb8c09641c8fd7cbedcc58d160f13faff17541de4435b3ff5029bf5c6f34ac7a8b66efb897300670

    • C:\Windows\SysWOW64\shervans.dll

      Filesize

      8KB

      MD5

      2967492d95a1da4c0c0231fce9b050f8

      SHA1

      c93df4eaded19bad217eefa0d6b0c8738d13aeaf

      SHA256

      fc826f385326972439029bf5328c29d093d5ecee254a1e4cead3bd94c0bb13a6

      SHA512

      8fb235a02ec9c61520c44297863e82cc31f6f3d0fa5616357d7b9d98810e8b2a33979b66a04c71f158487f5e0c3586f26edba8432851f54a101527aae2e0ecff

    • memory/1484-29-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1484-40-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1484-38-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/1484-36-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/1600-25-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1600-28-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3404-23-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3404-0-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3404-24-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/3404-16-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB