Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 12:36

General

  • Target

    7c497a15d00cc46f9ca2fd89426e2ce0_NeikiAnalytics.exe

  • Size

    204KB

  • MD5

    7c497a15d00cc46f9ca2fd89426e2ce0

  • SHA1

    2a02c3973f728924f0e4bef7a19ace72e0c1b467

  • SHA256

    76886fc56486c6f7d908a29f63bdd1abad67d0ea6b440acd757ef3950fb301b6

  • SHA512

    a275baf488852d54805c664424617e376ac48c34437f24693c59092416378182d7615857efaa17bb53e4a6416ceb4d6b6b786fd5fe84c39dc40a8d62673ee2e0

  • SSDEEP

    3072:m/5F/E7tEf0E+p+tYlpJH7iXQNgggHlxDZiYLK5WpYMGmUXNQDaG0A8+:mhF4c5+wWJH7igNgjdFKsumUXG+i

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 14 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c497a15d00cc46f9ca2fd89426e2ce0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7c497a15d00cc46f9ca2fd89426e2ce0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:228
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1048
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1900
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4080
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1432
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3896
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2920
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4428
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1096
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3976
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4216
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2632
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2140
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:384
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1256
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

      Filesize

      204KB

      MD5

      1db568b1aa44f58809d09f65dc10950d

      SHA1

      0ce2ae9e5aab71159fc8e19f7e910caca28954b9

      SHA256

      764c150e358ab42fe9942eb945002e9fe4bc68fb83bd16a461d7c2e0519c59b9

      SHA512

      afb210fed4dca1571e7da5db30ad944c865f11249bc9c9c7e0a47a66210a21d0eec1efbcf78d4593793b2618aab6d6de1a023e57109ab4e3573f208f73531fc1

    • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

      Filesize

      204KB

      MD5

      23a33997970ed1e9452333a4edc7cb69

      SHA1

      5462dd9f07ee461a9a9844c9b18e09f6a8cc7474

      SHA256

      7e56d3e05004b187e478d093f5647235bc9a72f5dcd130e4bb138df9b6036476

      SHA512

      6ae7e5710f0489c7a7ddafb91a167484f3c8049af54f041144df8d9dbe0c2c9a4e6ee7e67f7d2727b0d3891f011463c410f53e24d35418d1ce130b718438de34

    • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

      Filesize

      204KB

      MD5

      aae3f308a6ce6a09cd61c7e3ffa18ce3

      SHA1

      386b238c46f09e2e5c8bd1d5d83914dd60f7b3a0

      SHA256

      cd047517bd41c81a8ddbce1ac327da4e855eaeec25915d25fa184a60f2dff738

      SHA512

      339ff5c6ec178a2a54ce4cc2100bf3a6f16ddedf2abe446b37f47a3af135f9e6479a12313ba13ea1e3ad7a2a7155b7bb52ae422720d6dd89e970ce9b3162c086

    • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

      Filesize

      204KB

      MD5

      5b692778cf3fc5f163a1d4bbbe020d82

      SHA1

      02202d48404d7491ad6f98ff4457185ead165d72

      SHA256

      e15c57f99a8833d949175c52b3b80257d9b16c14f9f4b6fd90e9f83172ae855f

      SHA512

      c9e6bc7844110fad32f8ac4f7c3b9cdbafb264025bba2fce1dcdf13703292ab4f290c2365c5be092b3dd8f6d4525f8117377820ccf43859dfcf83668d9d96098

    • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

      Filesize

      204KB

      MD5

      d1640672de97f0f585922d9efbabadc7

      SHA1

      026e41e13c18619836d7ea913fe7ad07826e542e

      SHA256

      fdfd79aff8cbd97947a469422ef519b34c06ec91b0efdd6d32f29dc72da51924

      SHA512

      b9c99726a90cefc9a7b78e3f459fbf5e935d11a6f9e7d70ad7a971b593444c396fe067a5c55324b8dd9ecf52337062d03ff64ab1065d0594973c2bc7a0ef9a43

    • C:\Users\Admin\AppData\Local\winlogon.exe

      Filesize

      204KB

      MD5

      7c497a15d00cc46f9ca2fd89426e2ce0

      SHA1

      2a02c3973f728924f0e4bef7a19ace72e0c1b467

      SHA256

      76886fc56486c6f7d908a29f63bdd1abad67d0ea6b440acd757ef3950fb301b6

      SHA512

      a275baf488852d54805c664424617e376ac48c34437f24693c59092416378182d7615857efaa17bb53e4a6416ceb4d6b6b786fd5fe84c39dc40a8d62673ee2e0

    • C:\Windows\SysWOW64\IExplorer.exe

      Filesize

      204KB

      MD5

      eba5ce669e784052fd4ab1693ae0dbef

      SHA1

      ebfa9501f9f8a6a18cea102056f3aa99dd766524

      SHA256

      2439b99c51754b74920f436e122c117011913484d4859a7cc9838ff571d37465

      SHA512

      2530f3edae1ed5da06d1890787b5107f98fbd917c4140c768f77de7bd6f1cb7a3ad61251d1ec359e965201f7e446cec7be9ba9ff0b6a72ada4e99334779bccf4

    • C:\Windows\SysWOW64\IExplorer.exe

      Filesize

      204KB

      MD5

      ad222271f2392842848fa01049f62190

      SHA1

      da3f431d61d4c3cc551dfd7f61b135a03dc4e209

      SHA256

      0b2fe71e13381a07e734a4a0cf594ec1a59511a1fbe523fff4bd4d8d88466e41

      SHA512

      eefc2dd33c4ae6940fa05565d35fe7c9eadaa678b2378c3fd0acc050a4f490d1f3a417d581dc30867fa8b69c717770b62efc42d73fb138d67d05da3cd2e5dcc1

    • C:\Windows\xk.exe

      Filesize

      204KB

      MD5

      33bdd92ab73863d7b7194e8de90a1856

      SHA1

      0d8c4e9236514f6366929afa9315de64e968d371

      SHA256

      38f9cb3e674215c932b674f4d7b8ffbe1541752c07089bb4a75ab39bcdb1cc2e

      SHA512

      747926b4173e1630e48d166ebd241c9693f6249a1eb2e23c81ab5a26216569415c1334624cfd9819398ccdc91e7e2e2c6031238af667ec42b301d9173df7665e

    • C:\XK\Folder.htt

      Filesize

      640B

      MD5

      5d142e7978321fde49abd9a068b64d97

      SHA1

      70020fcf7f3d6dafb6c8cd7a55395196a487bef4

      SHA256

      fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061

      SHA512

      2351284652a9a1b35006baf4727a85199406e464ac33cb4701a6182e1076aaff022c227dbe4ad6e916eba15ebad08b10719a8e86d5a0f89844a163a7d4a7bbf9

    • C:\desktop.ini

      Filesize

      217B

      MD5

      c00d8433fe598abff197e690231531e0

      SHA1

      4f6b87a4327ff5343e9e87275d505b9f145a7e42

      SHA256

      52fb776a91b260bf196016ecb195550cdd9084058fe7b4dd3fe2d4fda1b6470e

      SHA512

      a71523ec2bd711e381a37baabd89517dff6c6530a435f4382b7f4056f98aff5d6014e85ce3b79bd1f02fdd6adc925cd3fc051752c1069e9eb511a465cd9908e1

    • memory/228-273-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/228-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/228-198-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/384-239-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/384-241-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1048-134-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1048-126-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1096-217-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1256-252-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1432-147-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1432-151-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1900-133-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1900-137-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2140-236-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2632-232-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2632-228-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2920-165-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2920-161-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3896-158-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3896-155-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3976-222-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3976-218-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4080-144-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4080-140-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4216-227-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4216-223-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4428-178-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4428-168-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB