Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 09:12

General

  • Target

    3cccca339acfa9dd18429e7785f955a0_NeikiAnalytics.exe

  • Size

    630KB

  • MD5

    3cccca339acfa9dd18429e7785f955a0

  • SHA1

    7939c8ceec1047034c87805181fd811bca4937e6

  • SHA256

    55f48df014f6c742df584bede31aacd0060407874ce2190e967838dbfaea4d72

  • SHA512

    183eec32622a0412349f5f35079d2a64cfae31c6fdfa7c4303654434d1ac99449a9037a8de956ac28a4bda598bb97f19aa8abb36140e36eec6d8a133d8b41050

  • SSDEEP

    3072:etwizQTj8CSUYf8W3nSjen++Bj88OZS0/Qe2HdOylqwvwK42i1ZKEJAl9uH4:iuj8NDF3OR9/Qe2HdJfwK4DdW9Y4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cccca339acfa9dd18429e7785f955a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3cccca339acfa9dd18429e7785f955a0_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Program Files (x86)\Internet Explorer\casino_extensions.exe
      "C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\casino_extensions.exe
        C:\Windows\system32\casino_extensions.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Program Files (x86)\Internet Explorer\casino_extensions.exe
          "C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"
          4⤵
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:2084
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c $$2028~1.BAT
            5⤵
              PID:2980
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 236
          3⤵
          • Program crash
          PID:2608

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Internet Explorer\$$202803s.bat

      Filesize

      81B

      MD5

      4777bf695815d870d27ed4a38a8f0840

      SHA1

      565412b5182bca7a221448dba78369c42d1c4a0c

      SHA256

      c08018226d9a45ab277a01ca35f519ff7ea1cb450d080e24b0f590739654241d

      SHA512

      87e792d326c5a9d2d92984ec4c34d2af9d616a4676a7d69df73b09975fd077d96077ae2528b6fc05752110eb4e406c3e9d94d49d0a74eeaba6bc6a48bca8ac1d

    • C:\Windows\SysWOW64\LiveMessageCenter.exe

      Filesize

      647KB

      MD5

      bc4094d02012a0efbbabfcc33130a3e0

      SHA1

      cbf878e13af7195cb0517566970410a2370ea85d

      SHA256

      36530997316b6c64160d7380f82c3e35e388c1e11fc9d48ff647868044d6adf9

      SHA512

      6b805173662bb6459794b86d27b84eb4d8adc33179f873812c3d0ab57446342ea8b4777623b924205bd4c9dd888a307583c6495fc91027365fec266f7b1b741b

    • \Windows\SysWOW64\casino_extensions.exe

      Filesize

      646KB

      MD5

      ae3ab233ab2d51c8e0cc0d30dc657feb

      SHA1

      4adce29401ed15f94392665cc848a429d39a29ff

      SHA256

      bfe0ca19a45820ab26d3d873cdedef90ffdc804e13ad3bf1c45dfcec67ef5baa

      SHA512

      255cbdbb4f09a4a12f069b27f0a5128c06a418d15c336d27d3f22ad91886dfc31cba3f7916db5c6a67c9813ce54f24778a3acbf41b2881244f93dfdeb998bd6e

    • memory/1600-23-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1600-26-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB