Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
74c9f129be51a92665d284ec1f7db400_NeikiAnalytics.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
74c9f129be51a92665d284ec1f7db400_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
74c9f129be51a92665d284ec1f7db400_NeikiAnalytics.dll
-
Size
27KB
-
MD5
74c9f129be51a92665d284ec1f7db400
-
SHA1
5d17c507ec067947941fd22ceb5b8afafcd7b2d0
-
SHA256
3e95cdf0af2d76b39ec95278d5f67f7bccc0e431fce366adb230a5b2887a1aaf
-
SHA512
89071525f1802173bc6a8d6c60929479aaea81cb59784a77cfbe2786a53e0fb2f15555672f15b8de6e2b66250d353965b14477d05beb9160430270051f750e51
-
SSDEEP
384:/IvmagF80eOlE1CKlCLKArOR7WKgNCnXoyKXKAtwF66tl1/75T6CitebDz13wxGw:Ev0HQ3ia73gvy8GF9/1IZ2Dz13sGDcrT
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 828 rundll32.exe 828 rundll32.exe 1724 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\efcAQHWm.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\efcAQHWm.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\efcAQHWm.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33DA9E3C-935E-4EC2-977D-AFE3A3B5E727} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33DA9E3C-935E-4EC2-977D-AFE3A3B5E727}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33DA9E3C-935E-4EC2-977D-AFE3A3B5E727}\InprocServer32\ = "C:\\Windows\\SysWow64\\efcAQHWm.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33DA9E3C-935E-4EC2-977D-AFE3A3B5E727}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 828 rundll32.exe 828 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 828 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 828 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 828 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1772 wrote to memory of 828 1772 rundll32.exe 84 PID 1772 wrote to memory of 828 1772 rundll32.exe 84 PID 1772 wrote to memory of 828 1772 rundll32.exe 84 PID 828 wrote to memory of 620 828 rundll32.exe 5 PID 828 wrote to memory of 1724 828 rundll32.exe 97 PID 828 wrote to memory of 1724 828 rundll32.exe 97 PID 828 wrote to memory of 1724 828 rundll32.exe 97
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74c9f129be51a92665d284ec1f7db400_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74c9f129be51a92665d284ec1f7db400_NeikiAnalytics.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\efcAQHWm.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD574c9f129be51a92665d284ec1f7db400
SHA15d17c507ec067947941fd22ceb5b8afafcd7b2d0
SHA2563e95cdf0af2d76b39ec95278d5f67f7bccc0e431fce366adb230a5b2887a1aaf
SHA51289071525f1802173bc6a8d6c60929479aaea81cb59784a77cfbe2786a53e0fb2f15555672f15b8de6e2b66250d353965b14477d05beb9160430270051f750e51