Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 01:26 UTC
Static task
static1
Behavioral task
behavioral1
Sample
789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe
-
Size
71KB
-
MD5
789edab6aae0e66bc459d4250dad9750
-
SHA1
11740cde0405942d5cd434a7cb92d694ad1b6ba3
-
SHA256
fdd09df0c7f3ce5305b846d349bc9312b92cd62e0464987361d7894b739ec991
-
SHA512
2ef047cb7ce733b26ace0eee663d2970224c7eefa24a087e6b9713a27381cc2fe4d29e39b1f14df5791b5e7da1830b684daf2f017451cb14ed03bb2283ca1cd2
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slu:Olg35GTslA5t3/w8v
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ivsootov-uceas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ivsootov-uceas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ivsootov-uceas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ivsootov-uceas.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851}\IsInstalled = "1" ivsootov-uceas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851}\StubPath = "C:\\Windows\\system32\\ksugead.exe" ivsootov-uceas.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851} ivsootov-uceas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" ivsootov-uceas.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" ivsootov-uceas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\flopug-ukoot.exe" ivsootov-uceas.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe ivsootov-uceas.exe -
Executes dropped EXE 2 IoCs
pid Process 2272 ivsootov-uceas.exe 2808 ivsootov-uceas.exe -
Loads dropped DLL 3 IoCs
pid Process 1192 789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe 1192 789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe 2272 ivsootov-uceas.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ivsootov-uceas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ivsootov-uceas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ivsootov-uceas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ivsootov-uceas.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} ivsootov-uceas.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ivsootov-uceas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" ivsootov-uceas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\ourvooxix.dll" ivsootov-uceas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" ivsootov-uceas.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ivsootov-uceas.exe 789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe File created C:\Windows\SysWOW64\flopug-ukoot.exe ivsootov-uceas.exe File opened for modification C:\Windows\SysWOW64\ourvooxix.dll ivsootov-uceas.exe File created C:\Windows\SysWOW64\ivsootov-uceas.exe 789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\flopug-ukoot.exe ivsootov-uceas.exe File opened for modification C:\Windows\SysWOW64\ksugead.exe ivsootov-uceas.exe File created C:\Windows\SysWOW64\ksugead.exe ivsootov-uceas.exe File created C:\Windows\SysWOW64\ourvooxix.dll ivsootov-uceas.exe File opened for modification C:\Windows\SysWOW64\ivsootov-uceas.exe ivsootov-uceas.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2808 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe 2272 ivsootov-uceas.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1192 789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe Token: SeDebugPrivilege 2272 ivsootov-uceas.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2272 1192 789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe 28 PID 1192 wrote to memory of 2272 1192 789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe 28 PID 1192 wrote to memory of 2272 1192 789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe 28 PID 1192 wrote to memory of 2272 1192 789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe 28 PID 2272 wrote to memory of 428 2272 ivsootov-uceas.exe 5 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 2808 2272 ivsootov-uceas.exe 29 PID 2272 wrote to memory of 2808 2272 ivsootov-uceas.exe 29 PID 2272 wrote to memory of 2808 2272 ivsootov-uceas.exe 29 PID 2272 wrote to memory of 2808 2272 ivsootov-uceas.exe 29 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21 PID 2272 wrote to memory of 1200 2272 ivsootov-uceas.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\ivsootov-uceas.exe"C:\Windows\system32\ivsootov-uceas.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\ivsootov-uceas.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
-
Network
-
Remote address:8.8.8.8:53Requesthlombkvfroe.phIN AResponsehlombkvfroe.phIN A45.79.222.138
-
Remote address:45.79.222.138:80ResponseHTTP/1.1 400 Bad request
Cache-Control: no-cache
Connection: close
Content-Type: text/html
-
Remote address:8.8.8.8:53Requestutbidet-ugeas.bizIN AResponseutbidet-ugeas.bizIN A127.0.0.1
-
Remote address:8.8.8.8:53Requestutbidet-ugeas.bizIN AResponseutbidet-ugeas.bizIN A127.0.0.1
-
236 B 339 B 5 3
HTTP Response
400 -
-
-
60 B 181 B 1 1
DNS Request
hlombkvfroe.ph
DNS Response
45.79.222.138
-
63 B 79 B 1 1
DNS Request
utbidet-ugeas.biz
DNS Response
127.0.0.1
-
63 B 79 B 1 1
DNS Request
utbidet-ugeas.biz
DNS Response
127.0.0.1
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD52785411c2e2c659dfb0b9ff8fcd43b2b
SHA16058caeb0a718722bbabac6673c41291eb0f0765
SHA2566a3ac155a6e85d35317948ec4cb49b17bdb05d61d4fd2cf1632bcb027dc38916
SHA512c14c87100f9fe7caadfdc1f7f85826bf66325fd1a23f09985c81c0fb185ff64956e7acccb29a2c8fd8645a326673285641042a58556795a38e651a12ffd0135b
-
Filesize
71KB
MD5789edab6aae0e66bc459d4250dad9750
SHA111740cde0405942d5cd434a7cb92d694ad1b6ba3
SHA256fdd09df0c7f3ce5305b846d349bc9312b92cd62e0464987361d7894b739ec991
SHA5122ef047cb7ce733b26ace0eee663d2970224c7eefa24a087e6b9713a27381cc2fe4d29e39b1f14df5791b5e7da1830b684daf2f017451cb14ed03bb2283ca1cd2
-
Filesize
73KB
MD5c02af1c99c458ce94f344f5a251464b2
SHA1fcb6539a728bda0b5d4289a66b5d4f9e435bf3e9
SHA25653f7bc0675e226a94850cac55ce4220276bcb6ed26c07665258446b094b4f059
SHA512de8e783a53bb0335a3f6a6f3aed5954be6366a8af53c8025e8e00feb038ec17f262cb1cca583035561d1e20d38252ee708fc61bbebbb478b5f1a114b3cd832a8
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4