Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
59b1984572c2ae6a7dddbf7b56738130_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
59b1984572c2ae6a7dddbf7b56738130_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
59b1984572c2ae6a7dddbf7b56738130_NeikiAnalytics.dll
-
Size
468KB
-
MD5
59b1984572c2ae6a7dddbf7b56738130
-
SHA1
864b626f79aa3a7feaf04c95f20b37d02b18e1bd
-
SHA256
15e502896e34d87921319a8830dc75d38580e5d15dcbbd9f9ee882efcabf3352
-
SHA512
29b7089f232e74b0620b2245c40b314d64010d7ac0a11b4b4de49a3aa59e8eb1e28eae3b063bf31bcafff0d4a30375c48f1400ff133b6cefa45ed521a78ea25b
-
SSDEEP
6144:oi05kH9OyU2uv5SRf/FWgFgt0gqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:7rHGPv5SmptZDmUWuVZkxikdXcq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tonqjizj = "\"C:\\Users\\Admin\\AppData\\Roaming\\5G18UBt\\rdpclip.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\4434\SystemPropertiesPerformance.exe cmd.exe File created C:\Windows\system32\4434\SystemPropertiesPerformance.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1376 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\MSCFile\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\MSCFile\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\MSCFile\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\MSCFile\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\Q9O.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\MSCFile\shell Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2428 rundll32.exe 2428 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2008 1200 Process not Found 28 PID 1200 wrote to memory of 2008 1200 Process not Found 28 PID 1200 wrote to memory of 2008 1200 Process not Found 28 PID 1200 wrote to memory of 2676 1200 Process not Found 29 PID 1200 wrote to memory of 2676 1200 Process not Found 29 PID 1200 wrote to memory of 2676 1200 Process not Found 29 PID 1200 wrote to memory of 1980 1200 Process not Found 31 PID 1200 wrote to memory of 1980 1200 Process not Found 31 PID 1200 wrote to memory of 1980 1200 Process not Found 31 PID 1980 wrote to memory of 2524 1980 cmd.exe 33 PID 1980 wrote to memory of 2524 1980 cmd.exe 33 PID 1980 wrote to memory of 2524 1980 cmd.exe 33 PID 1200 wrote to memory of 2580 1200 Process not Found 34 PID 1200 wrote to memory of 2580 1200 Process not Found 34 PID 1200 wrote to memory of 2580 1200 Process not Found 34 PID 1200 wrote to memory of 2332 1200 Process not Found 35 PID 1200 wrote to memory of 2332 1200 Process not Found 35 PID 1200 wrote to memory of 2332 1200 Process not Found 35 PID 1200 wrote to memory of 3036 1200 Process not Found 37 PID 1200 wrote to memory of 3036 1200 Process not Found 37 PID 1200 wrote to memory of 3036 1200 Process not Found 37 PID 3036 wrote to memory of 3032 3036 eventvwr.exe 38 PID 3036 wrote to memory of 3032 3036 eventvwr.exe 38 PID 3036 wrote to memory of 3032 3036 eventvwr.exe 38 PID 3032 wrote to memory of 1376 3032 cmd.exe 40 PID 3032 wrote to memory of 1376 3032 cmd.exe 40 PID 3032 wrote to memory of 1376 3032 cmd.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\59b1984572c2ae6a7dddbf7b56738130_NeikiAnalytics.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:2008
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\3HteF.cmd1⤵PID:2676
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{33819f3b-2f8d-cfcb-0a23-a942879f9636}"1⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{33819f3b-2f8d-cfcb-0a23-a942879f9636}"2⤵PID:2524
-
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:2580
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\QfKeb.cmd1⤵
- Drops file in System32 directory
PID:2332
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\Q9O.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Vmvmshnity" /SC minute /MO 60 /TR "C:\Windows\system32\4434\SystemPropertiesPerformance.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:1376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235B
MD5062a70a540613ccad6ccc36c2fc3bad4
SHA1268b41171eed8ed8ba456f1ab232c4a361cb3580
SHA256949013822247389954fc49a7eb9d97a181c71f537b6f55028520a282dbd2ba43
SHA51233e61038a1a13016efe99c571a2706b793c2154910c1721ec575c48f0c1c1494b5191eb1ba35694bcd9f12889cc9da2cae79491a4d03507355b3759bbb0884ad
-
Filesize
476KB
MD5153228f38b7d047bd7ed9039a7f078ef
SHA11617c0451b27429aef4ed28773792d800c50c551
SHA2561fb60f285663b36c98a6f19bc3b746bac47fccb65345dda3930f2005e9013c73
SHA512ad9adad67ac4e73175921625dd7ba443c0bcfcde29b0d5d11a5b102a4cae5894a3b665b315a06e895a7425d2ba0d7059d028bedb11e152130f9e0272916ad0d6
-
Filesize
472KB
MD521742bc4caa0ac1e8b6455577120e75d
SHA1ace278985a191ae3d137a8fdea11d2f9dcd16710
SHA25667e3b54fe15709c7203b0cff8c87d18e5b4906eb88046b7a087161d8f2136393
SHA512a0e4b0b8ea6fc10532e78bebf7f69afdd41e37c3ff3f7104485550cf9cf1bce343eaa3c86aed6e15a10a2bcc7732084e3dc752884007859c139d43b75e386345
-
Filesize
148B
MD5d505fee8f9f5d70b6f38032913c54476
SHA1599f0db5596a7ebdf02025be00b08c0c1977e153
SHA2569257b7244ef06cf07852c6956352601b4fe58458de56cc1d0ad8c81d0dd2f96a
SHA51285a8a5aea794e37012cf88f50179d62aa2f1ecf90e2450b66b95c7211e86fe176f8e75c03410255eac977eeb4f2db4a6d476db602ad370601c64c1222a98f952
-
Filesize
210B
MD52e20cc90bc4c62f988423d79f947039a
SHA15c46df25c177197f4111957fe4384dd06516b67b
SHA256f30659f15eaa6888ba686e2f0dae04c7e08744df600db843f5405bf037e6f015
SHA51270d922472b00f0473b7b5b5d0b7a0f3b2a25345ad6a76cc04939bfc3d35b4ba33dc78b59667b3356e6a7c5c76978435671dfee19cea0512056660371faec03e4
-
Filesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
Filesize
884B
MD5bfb1704c58d6368e6fab0cceafd77d90
SHA1976f912a5bbb02a282d26cb2a4b5c897cb91f98d
SHA25623cb12ef4515da99e2733c9e3bfa5108abc4db55ed038c09b5f641d0cd566bba
SHA512ca91398958fc957b0c700588013cb28cd63594e503b604d46023a2fb893b98f9227b95128f7d6b1a78af06edf4bc316fbe97f6ea77e8ca27df1edf04c7ac5dea