Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 11:04

General

  • Target

    dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    dbd4b7876a77f48240518ce1217c3420

  • SHA1

    7f9b7902d9d113d2a50243096f59cd4128bdc0c8

  • SHA256

    8b0f74da6c473134fec04a650c7e8b31d3c59351c8fc955fdfef46192dc36484

  • SHA512

    d16e003200a932e1bd62d4f1775c6ee16b6595a1f2630c27ad982280e11f107899f03d3c806de9191b75b81a938e042f129bfb12b2be71b6e95f31c9e2d8fad4

  • SSDEEP

    1536:vNIg8r8Q3LFLr7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:ALFLrJJjmLM3zRJWZsXy4Jd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\neodo.exe
      "C:\Users\Admin\neodo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\neodo.exe

    Filesize

    53KB

    MD5

    96dcbb034dd77579ed0fdee3a4794746

    SHA1

    5c807e4a3107a172dcf6702788e6def9415f3ca2

    SHA256

    de5078deaf77e370e1bf03da836568fbcc5f751b75982a58e1e0905dc5cffd28

    SHA512

    523861bfe2db866b2b444ce96c7e1265fecc78548c2c9a3bf843385e8c31177c57cbaa7f58fe26f6e25c99cedbc297078c8c8adcaf5df041d58a140cdd15de57

  • memory/1936-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1936-9-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1936-15-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/2836-16-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB