Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 04:16 UTC

General

  • Target

    a4ebfe9aa6a2012b29e5cd2acee67bd0_NeikiAnalytics.exe

  • Size

    1.1MB

  • MD5

    a4ebfe9aa6a2012b29e5cd2acee67bd0

  • SHA1

    1025b663e13c8d8e0f8b41a070c0cfbceb779d03

  • SHA256

    c9e4e1d05f05ecf088f37769b6c7b04b4d5f13f0f27755e2e7b1d192b153b978

  • SHA512

    77907c6cfee08d021244eb6e9086b85212d0624354c7f231703e2fbe49a59590b3e77dd134900b059bc018d37474c914d2f930e39432ab87025d2e7659a05673

  • SSDEEP

    24576:zQ5aILMCfmAUhrSO1YNWdvCzMPqdUD6dNXfpt7le:E5aIwC+AUBsWsXZY

Malware Config

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 1 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4ebfe9aa6a2012b29e5cd2acee67bd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a4ebfe9aa6a2012b29e5cd2acee67bd0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\SysWOW64\cmd.exe
      /c sc stop WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\SysWOW64\sc.exe
        sc stop WinDefend
        3⤵
        • Launches sc.exe
        PID:2616
    • C:\Windows\SysWOW64\cmd.exe
      /c sc delete WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\SysWOW64\sc.exe
        sc delete WinDefend
        3⤵
        • Launches sc.exe
        PID:1780
    • C:\Windows\SysWOW64\cmd.exe
      /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
      2⤵
        PID:2648
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableRealtimeMonitoring $true
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2792
      • C:\Users\Admin\AppData\Roaming\WinSocket\a4ebfe9aa7a2012b29e6cd2acee78bd0_NeikiAnalytict.exe
        C:\Users\Admin\AppData\Roaming\WinSocket\a4ebfe9aa7a2012b29e6cd2acee78bd0_NeikiAnalytict.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Windows\SysWOW64\cmd.exe
          /c sc stop WinDefend
          3⤵
            PID:2528
            • C:\Windows\SysWOW64\sc.exe
              sc stop WinDefend
              4⤵
              • Launches sc.exe
              PID:1840
          • C:\Windows\SysWOW64\cmd.exe
            /c sc delete WinDefend
            3⤵
              PID:2716
              • C:\Windows\SysWOW64\sc.exe
                sc delete WinDefend
                4⤵
                • Launches sc.exe
                PID:2424
            • C:\Windows\SysWOW64\cmd.exe
              /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
              3⤵
                PID:2428
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell Set-MpPreference -DisableRealtimeMonitoring $true
                  4⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2756
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe
                3⤵
                  PID:2548
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {835CEBDF-9155-479E-924E-1E92D7623234} S-1-5-18:NT AUTHORITY\System:Service:
              1⤵
                PID:2340
                • C:\Users\Admin\AppData\Roaming\WinSocket\a4ebfe9aa7a2012b29e6cd2acee78bd0_NeikiAnalytict.exe
                  C:\Users\Admin\AppData\Roaming\WinSocket\a4ebfe9aa7a2012b29e6cd2acee78bd0_NeikiAnalytict.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:1860
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe
                    3⤵
                      PID:576
                  • C:\Users\Admin\AppData\Roaming\WinSocket\a4ebfe9aa7a2012b29e6cd2acee78bd0_NeikiAnalytict.exe
                    C:\Users\Admin\AppData\Roaming\WinSocket\a4ebfe9aa7a2012b29e6cd2acee78bd0_NeikiAnalytict.exe
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1040
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe
                      3⤵
                        PID:2136

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    c489cb6d7a670bf3fe6b3944339ecf6a

                    SHA1

                    eab5b8ae59bbe0eb719eaef94618aebb7bdee9c4

                    SHA256

                    ae6e568de409559913ad2209bcb3a5e68d54a9aa24fc5d637458916e77e04e86

                    SHA512

                    87204db212e63f8c74d03cfa0153002fb438fb788347e160f989d61b584c5e6c194865dedd9c8c64729a4b85688ccdb5ec54f6029b30ec12330e20cdafe8fe24

                  • \Users\Admin\AppData\Roaming\WinSocket\a4ebfe9aa7a2012b29e6cd2acee78bd0_NeikiAnalytict.exe

                    Filesize

                    1.1MB

                    MD5

                    a4ebfe9aa6a2012b29e5cd2acee67bd0

                    SHA1

                    1025b663e13c8d8e0f8b41a070c0cfbceb779d03

                    SHA256

                    c9e4e1d05f05ecf088f37769b6c7b04b4d5f13f0f27755e2e7b1d192b153b978

                    SHA512

                    77907c6cfee08d021244eb6e9086b85212d0624354c7f231703e2fbe49a59590b3e77dd134900b059bc018d37474c914d2f930e39432ab87025d2e7659a05673

                  • memory/1320-7-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-6-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-11-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-10-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-9-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-8-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-13-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-12-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-5-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-3-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-2-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-15-0x00000000025B0000-0x00000000025D9000-memory.dmp

                    Filesize

                    164KB

                  • memory/1320-18-0x0000000000400000-0x0000000000472000-memory.dmp

                    Filesize

                    456KB

                  • memory/1320-17-0x0000000000421000-0x0000000000422000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-14-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1320-4-0x0000000000340000-0x0000000000341000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-79-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-73-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-68-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-69-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-70-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-71-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-72-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-78-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-74-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-75-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-76-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1860-77-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2548-50-0x0000000010000000-0x000000001001E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2548-55-0x00000000000E0000-0x00000000000E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2548-51-0x0000000010000000-0x000000001001E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2780-33-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-32-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-41-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-44-0x0000000000400000-0x0000000000472000-memory.dmp

                    Filesize

                    456KB

                  • memory/2780-46-0x0000000010000000-0x0000000010007000-memory.dmp

                    Filesize

                    28KB

                  • memory/2780-30-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-31-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-45-0x0000000010000000-0x0000000010007000-memory.dmp

                    Filesize

                    28KB

                  • memory/2780-40-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-34-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-35-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-36-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-37-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-38-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  • memory/2780-39-0x0000000000260000-0x0000000000261000-memory.dmp

                    Filesize

                    4KB

                  We care about your privacy.

                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.