Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe
-
Size
73KB
-
MD5
fd3f29ea4f981d32b9cdc57fc7512860
-
SHA1
6c3aa75ecfe04390eba55a2cbc6114d053bd16e1
-
SHA256
14395a13be80e458bd52675e5784a1d477946d651a842d8bd959c4606f98c758
-
SHA512
7e773d911e6077eb629ffe1da74d76f0b331c6d2c9b26b89f2c037ce2464d3bc7c39ba33148b08d0ae7492531167172dfbc40ed870a6e5e7507fc38366cfa14a
-
SSDEEP
1536:xQ3YrzjzGabh9X0PCig8Hf7j6iQ3e7Org3ye:qizj7bhtMC98/7pIe7Dye
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ubronook-ucor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ubronook-ucor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ubronook-ucor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ubronook-ucor.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{51475451-5a54-5245-5147-54515A545245}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" ubronook-ucor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{51475451-5a54-5245-5147-54515A545245}\IsInstalled = "1" ubronook-ucor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{51475451-5a54-5245-5147-54515A545245}\StubPath = "C:\\Windows\\system32\\esseahoox.exe" ubronook-ucor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{51475451-5a54-5245-5147-54515A545245} ubronook-ucor.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe ubronook-ucor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" ubronook-ucor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\igcoavoof-eacoot.exe" ubronook-ucor.exe -
Executes dropped EXE 2 IoCs
pid Process 2356 ubronook-ucor.exe 2272 ubronook-ucor.exe -
Loads dropped DLL 3 IoCs
pid Process 1700 fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe 1700 fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe 2356 ubronook-ucor.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ubronook-ucor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ubronook-ucor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ubronook-ucor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ubronook-ucor.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ubronook-ucor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" ubronook-ucor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\rnemig.dll" ubronook-ucor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" ubronook-ucor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} ubronook-ucor.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ubronook-ucor.exe fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe File created C:\Windows\SysWOW64\ubronook-ucor.exe fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\esseahoox.exe ubronook-ucor.exe File created C:\Windows\SysWOW64\esseahoox.exe ubronook-ucor.exe File opened for modification C:\Windows\SysWOW64\igcoavoof-eacoot.exe ubronook-ucor.exe File created C:\Windows\SysWOW64\igcoavoof-eacoot.exe ubronook-ucor.exe File opened for modification C:\Windows\SysWOW64\rnemig.dll ubronook-ucor.exe File created C:\Windows\SysWOW64\rnemig.dll ubronook-ucor.exe File opened for modification C:\Windows\SysWOW64\ubronook-ucor.exe ubronook-ucor.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2272 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe 2356 ubronook-ucor.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 ubronook-ucor.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2356 1700 fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe 28 PID 1700 wrote to memory of 2356 1700 fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe 28 PID 1700 wrote to memory of 2356 1700 fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe 28 PID 1700 wrote to memory of 2356 1700 fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe 28 PID 2356 wrote to memory of 436 2356 ubronook-ucor.exe 5 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 2272 2356 ubronook-ucor.exe 29 PID 2356 wrote to memory of 2272 2356 ubronook-ucor.exe 29 PID 2356 wrote to memory of 2272 2356 ubronook-ucor.exe 29 PID 2356 wrote to memory of 2272 2356 ubronook-ucor.exe 29 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21 PID 2356 wrote to memory of 1204 2356 ubronook-ucor.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\fd3f29ea4f981d32b9cdc57fc7512860_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\ubronook-ucor.exe"C:\Windows\SysWOW64\ubronook-ucor.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\ubronook-ucor.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD512f88d8f4dd08f0554a80b6cebdb0af9
SHA1e35d944e0992768ca664170ce890c41187660098
SHA256348d044a7975a2e5ff7f49da6eca8a1762a7b50a433bbf9e957166e8b6579d4d
SHA512b2db126ffa5329138fa6c6bf2dd52eddcc9c2e581c5c4435fc8598c9faeac6cd9ad0daf19830e392c07b18a47c4f5b6d8a5e9932d5cc4f28f9e77ba731ea5912
-
Filesize
74KB
MD5f9407715a511737a31985f7b0e0d5d80
SHA16ee9e425c7a0aaa103412ba0d64d95acb77cdd1c
SHA256613eea9238280c90e882754e84249c0ad5d168853d18a9e30c741edffe6d4916
SHA5126a8d42eb1294da0c050f72510978b01f7fe4a0cb6efa03c68af91e35b257b4dea5c08f9885217f30e9905825a56bbccf80354385c60914692f1c5e650b574da4
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
71KB
MD5256c2a3c79d4f094a5159782646b8173
SHA1600c5a5ff3c03c888e7284cbe5da964fddc6b95e
SHA2561b649717fc92e9bf9870b8f7636142f244004c59dedb427f4dab38c52f210759
SHA512ba02235fdb8841c2d88e3d76e2851c0752cbc8361f05417483c74b2e6b4dfca3080b0a6fbeb949d1b55b7d2c8ebb494f9dd3f7ac65c413fdf3fc40919af13518