Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 18:48

General

  • Target

    17a348c2d084ccba059374abdfc52c90_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    17a348c2d084ccba059374abdfc52c90

  • SHA1

    fb8908fecec3c27872ff7a5786677dd347544fbb

  • SHA256

    c55a8f486def463f724b25d9d701f25d0fd4d68c8464ccad83f06534005dcf9b

  • SHA512

    290e3212178badf4fe3eb68ce8fe3d07d9966e557b51544e829ae87f52b94ab9ac85482048f254f6b94da68c22ba2485966578fd5399b6b2bb57a3b56c02a23c

  • SSDEEP

    768:EeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09CyH:Eq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSD

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17a348c2d084ccba059374abdfc52c90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\17a348c2d084ccba059374abdfc52c90_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 828
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    af1f2298ff37123667b4be1dc3cfa135

    SHA1

    a562549d4a84bd9548a40d76d93230f4ad5e5581

    SHA256

    33e2b3c572299f195c5e022180bae02be4c23ae07042710a9a4b05dc0571e1a7

    SHA512

    baa6feb9e4b7159e8c1e7a1afa0071c08f2ea0142acfa577f44b795ea0eedb369223e49efc8947f306b5a192a58e5b602ac52e406a624d4b2cd71c216b65be43

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    e68cc1450b0127762eefd43965c83a2c

    SHA1

    16ce746b504ac1af36d1b13ea4ecec7f82730c21

    SHA256

    9a6f897ca471944d56b773cfa7c6b33f11313f54b4baa2e2dd00f6108a485723

    SHA512

    fb5cf55b38ac4b435b920af54c36c6600d2db7178bc466368fd7c269305a97c7411adececafe02254c56fe95ca8080d6028e8fd649eaae33b2e3488378e6b309

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    b34160ef55b29389034fadf31e11e2f4

    SHA1

    400b4252213eb5b62a3d22dd20e88ba14d69436d

    SHA256

    c1aeb96e18b0615920227e2dcebf568281cc9c77622fc17ee3cb7e5286bc5801

    SHA512

    982731b79c7a99d062d5e9190fbe0007fbfe3ecc1137458c6d4fe5c4e53600ed8d09ec12c734cf4cbff33e9e9e003475778aa26fd006dc10e5b349ae31ed70c2

  • \Windows\SysWOW64\smnss.exe

    Filesize

    41KB

    MD5

    403402c8cf912df9ea2ff469882f8f56

    SHA1

    56b17d4efc9e85a20425345238594c5887323721

    SHA256

    b593b05ac4f4be5271bafd5775b3620efd521f4b31fb91f222c88fee00451d9c

    SHA512

    270db73cf2269bd2a21e70270376984cc1d0ca0ecfd873bbe3ddb1728aad45bb622e9b9421cf0226288bda4407508476d37971fca1f3d52a6895f6ccc7d39582

  • memory/1952-26-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1952-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1952-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1952-18-0x0000000000350000-0x0000000000359000-memory.dmp

    Filesize

    36KB

  • memory/1952-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2600-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2600-31-0x0000000000340000-0x000000000035F000-memory.dmp

    Filesize

    124KB

  • memory/2600-36-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2612-43-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2612-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB