Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 01:26 UTC

General

  • Target

    789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    789edab6aae0e66bc459d4250dad9750

  • SHA1

    11740cde0405942d5cd434a7cb92d694ad1b6ba3

  • SHA256

    fdd09df0c7f3ce5305b846d349bc9312b92cd62e0464987361d7894b739ec991

  • SHA512

    2ef047cb7ce733b26ace0eee663d2970224c7eefa24a087e6b9713a27381cc2fe4d29e39b1f14df5791b5e7da1830b684daf2f017451cb14ed03bb2283ca1cd2

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slu:Olg35GTslA5t3/w8v

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:428
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1200
        • C:\Users\Admin\AppData\Local\Temp\789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\789edab6aae0e66bc459d4250dad9750_NeikiAnalytics.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1192
          • C:\Windows\SysWOW64\ivsootov-uceas.exe
            "C:\Windows\system32\ivsootov-uceas.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2272
            • C:\Windows\SysWOW64\ivsootov-uceas.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2808

      Network

      • flag-us
        DNS
        hlombkvfroe.ph
        ivsootov-uceas.exe
        Remote address:
        8.8.8.8:53
        Request
        hlombkvfroe.ph
        IN A
        Response
        hlombkvfroe.ph
        IN A
        45.79.222.138
      • flag-us
        DNS
        ivsootov-uceas.exe
        Remote address:
        45.79.222.138:80
        Response
        HTTP/1.1 400 Bad request
        Content-length: 90
        Cache-Control: no-cache
        Connection: close
        Content-Type: text/html
      • flag-us
        DNS
        utbidet-ugeas.biz
        ivsootov-uceas.exe
        Remote address:
        8.8.8.8:53
        Request
        utbidet-ugeas.biz
        IN A
        Response
        utbidet-ugeas.biz
        IN A
        127.0.0.1
      • flag-us
        DNS
        utbidet-ugeas.biz
        ivsootov-uceas.exe
        Remote address:
        8.8.8.8:53
        Request
        utbidet-ugeas.biz
        IN A
        Response
        utbidet-ugeas.biz
        IN A
        127.0.0.1
      • 45.79.222.138:80
        hlombkvfroe.ph
        http
        ivsootov-uceas.exe
        236 B
        339 B
        5
        3

        HTTP Response

        400
      • 127.0.0.1:80
        ivsootov-uceas.exe
      • 127.0.0.1:80
        ivsootov-uceas.exe
      • 8.8.8.8:53
        hlombkvfroe.ph
        dns
        ivsootov-uceas.exe
        60 B
        181 B
        1
        1

        DNS Request

        hlombkvfroe.ph

        DNS Response

        45.79.222.138

      • 8.8.8.8:53
        utbidet-ugeas.biz
        dns
        ivsootov-uceas.exe
        63 B
        79 B
        1
        1

        DNS Request

        utbidet-ugeas.biz

        DNS Response

        127.0.0.1

      • 8.8.8.8:53
        utbidet-ugeas.biz
        dns
        ivsootov-uceas.exe
        63 B
        79 B
        1
        1

        DNS Request

        utbidet-ugeas.biz

        DNS Response

        127.0.0.1

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\flopug-ukoot.exe

        Filesize

        74KB

        MD5

        2785411c2e2c659dfb0b9ff8fcd43b2b

        SHA1

        6058caeb0a718722bbabac6673c41291eb0f0765

        SHA256

        6a3ac155a6e85d35317948ec4cb49b17bdb05d61d4fd2cf1632bcb027dc38916

        SHA512

        c14c87100f9fe7caadfdc1f7f85826bf66325fd1a23f09985c81c0fb185ff64956e7acccb29a2c8fd8645a326673285641042a58556795a38e651a12ffd0135b

      • C:\Windows\SysWOW64\ivsootov-uceas.exe

        Filesize

        71KB

        MD5

        789edab6aae0e66bc459d4250dad9750

        SHA1

        11740cde0405942d5cd434a7cb92d694ad1b6ba3

        SHA256

        fdd09df0c7f3ce5305b846d349bc9312b92cd62e0464987361d7894b739ec991

        SHA512

        2ef047cb7ce733b26ace0eee663d2970224c7eefa24a087e6b9713a27381cc2fe4d29e39b1f14df5791b5e7da1830b684daf2f017451cb14ed03bb2283ca1cd2

      • C:\Windows\SysWOW64\ksugead.exe

        Filesize

        73KB

        MD5

        c02af1c99c458ce94f344f5a251464b2

        SHA1

        fcb6539a728bda0b5d4289a66b5d4f9e435bf3e9

        SHA256

        53f7bc0675e226a94850cac55ce4220276bcb6ed26c07665258446b094b4f059

        SHA512

        de8e783a53bb0335a3f6a6f3aed5954be6366a8af53c8025e8e00feb038ec17f262cb1cca583035561d1e20d38252ee708fc61bbebbb478b5f1a114b3cd832a8

      • C:\Windows\SysWOW64\ourvooxix.dll

        Filesize

        5KB

        MD5

        f37b21c00fd81bd93c89ce741a88f183

        SHA1

        b2796500597c68e2f5638e1101b46eaf32676c1c

        SHA256

        76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

        SHA512

        252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

      • memory/1192-9-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2272-55-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2808-56-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.