Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 07:07
Behavioral task
behavioral1
Sample
24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe
-
Size
1.7MB
-
MD5
24215bf60eb7eba8c0e01441d76bd410
-
SHA1
72fc342eb06923834d636a3f8ed6c60bb34a162d
-
SHA256
55428d7ab21866ead8e96311f3dab6a5e93540e81e59d1899083db0d2e829893
-
SHA512
c8a9065183bb438a42b3bd68ccdc2908aced971058f2cdfb4adf16d0e09a1bd7535dfed9d43b70a25a417ace717335ce97a8eb524bedeaf4edc028015428124f
-
SSDEEP
24576:dTWbrtYJ0iEW8sHg4UQmVh0VyzxfuT3Ckh22prGviyBKT3qduVIzuSYpLzKOb:dTWNYbMQmVh013lEuyvirTNVIdyb
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2788 explorku.exe -
Loads dropped DLL 1 IoCs
pid Process 2888 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/2888-2-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2888-1-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2888-3-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2888-0-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2888-8-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2888-7-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2888-6-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2888-5-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2888-4-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/files/0x0007000000015cc7-15.dat themida behavioral1/memory/2788-23-0x0000000000CD0000-0x0000000001220000-memory.dmp themida behavioral1/memory/2788-25-0x0000000000CD0000-0x0000000001220000-memory.dmp themida behavioral1/memory/2788-30-0x0000000000CD0000-0x0000000001220000-memory.dmp themida behavioral1/memory/2788-29-0x0000000000CD0000-0x0000000001220000-memory.dmp themida behavioral1/memory/2788-27-0x0000000000CD0000-0x0000000001220000-memory.dmp themida behavioral1/memory/2788-26-0x0000000000CD0000-0x0000000001220000-memory.dmp themida behavioral1/memory/2788-24-0x0000000000CD0000-0x0000000001220000-memory.dmp themida behavioral1/memory/2788-28-0x0000000000CD0000-0x0000000001220000-memory.dmp themida behavioral1/memory/2788-22-0x0000000000CD0000-0x0000000001220000-memory.dmp themida behavioral1/memory/2888-21-0x0000000001080000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2888-19-0x0000000004CA0000-0x00000000051F0000-memory.dmp themida behavioral1/memory/2788-32-0x0000000000CD0000-0x0000000001220000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorku.job 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2788 2888 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe 29 PID 2888 wrote to memory of 2788 2888 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe 29 PID 2888 wrote to memory of 2788 2888 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe 29 PID 2888 wrote to memory of 2788 2888 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD524215bf60eb7eba8c0e01441d76bd410
SHA172fc342eb06923834d636a3f8ed6c60bb34a162d
SHA25655428d7ab21866ead8e96311f3dab6a5e93540e81e59d1899083db0d2e829893
SHA512c8a9065183bb438a42b3bd68ccdc2908aced971058f2cdfb4adf16d0e09a1bd7535dfed9d43b70a25a417ace717335ce97a8eb524bedeaf4edc028015428124f