Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    19s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 05:55

General

  • Target

    9dcc62f90f83bc0be9dbde16e0d9ef90_NeikiAnalytics.exe

  • Size

    927KB

  • MD5

    9dcc62f90f83bc0be9dbde16e0d9ef90

  • SHA1

    daab377c064705427e0be237502279c346e5eb6f

  • SHA256

    94cba4ae9e7864cc785e801a921086197f71531a5daf91d2d81c2f5c7688bbd9

  • SHA512

    102c908db195e6b337dedb7c03756f0296f01eb18d737dac34e8f14f64dda44f8c990ba35f88b7c8f81a67a0afee9ea5554a198c564458aca22bae0144a98d95

  • SSDEEP

    24576:Wbo+tZe0p4Ek4niOkl/A04szE87JKTvmC:Wbo+PeW4SkZP4sz9Mbp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9dcc62f90f83bc0be9dbde16e0d9ef90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\9dcc62f90f83bc0be9dbde16e0d9ef90_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1768
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev189F.tmp!C:\Users\Admin\AppData\Local\Temp\9dcc62f90f83bc0be9dbde16e0d9ef90_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Users\Admin\AppData\Local\Temp\9DCC62F90F83BC0BE9DBDE16E0D9EF90_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    d4f324176e864a4ba6c86ac00ec33851

    SHA1

    953a5de37833fae53d66912fa86d8adceb3dd74e

    SHA256

    3c69a2458dc6d1a1d1022efae1146c5541c661eb7e161124eabea1bf4fc8c43b

    SHA512

    703eec6157d0750d0684f091d14c229a640adc5266a9499a7e7d16963514198ca6ad495954495eac70b76f130a14461742e8149c4f43e7ddd43c9387b56ab399

  • \Users\Admin\AppData\Local\Temp\9dcc62f90f83bc0be9dbde16e0d9ef90_NeikiAnalytics.exe

    Filesize

    847KB

    MD5

    c8f40f25f783a52262bdaedeb5555427

    SHA1

    e45e198607c8d7398745baa71780e3e7a2f6deca

    SHA256

    e81b44ee7381ae3b630488b6fb7e3d9ffbdd9ac3032181d4ccaaff3409b57316

    SHA512

    f5944743f54028eb1dd0f2d68468726b177d33185324da0da96cdd20768bab4ca2e507ae9157b2733fd6240c920b7e15a5f5b9f284ee09d0fd385fc895b97191

  • memory/1768-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1768-26-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1964-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1964-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2344-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2344-27-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB