Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 07:16

General

  • Target

    3c9661e2a76ec5bb2683493766f060d0_NeikiAnalytics.exe

  • Size

    170KB

  • MD5

    3c9661e2a76ec5bb2683493766f060d0

  • SHA1

    2c410ae440de85967f7f6736de95d709b94e2ff7

  • SHA256

    77c6967bca94a3206e83145c7f791aab5530c633fa31006191a5689c80f22933

  • SHA512

    66f2f4175263d57db57edcacf84141cfbbd71b0e3f49c414794b6640223e11ca21ad3795e3a989cf1bffc8d43f45686dc498731ad35dc5f3d89683397f96e9b1

  • SSDEEP

    3072:3JpOm5axh63laEo+pXX1pQD2UCohD8mxLCj+5cmeDye42L712xrpdJ8xLeb7UJ:5Am5oh63laEo+pXX1pkF8mxeq5+4m71l

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 14 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c9661e2a76ec5bb2683493766f060d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3c9661e2a76ec5bb2683493766f060d0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\ProgramData\WinNT\nlcmt.exe
      "C:\ProgramData\WinNT\nlcmt.exe" 1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Maps connected drives based on registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Users\Admin\AppData\Roaming\WinNT\nlcmt.exe
        "C:\Users\Admin\AppData\Roaming\WinNT\nlcmt.exe" 1
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2652
    • C:\ProgramData\WinNT\nlcmt.exe
      "C:\ProgramData\WinNT\nlcmt.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\ProgramData\WinNT\nlcmt.exe
        "C:\ProgramData\WinNT\nlcmt.exe" 1
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2792
  • C:\ProgramData\WinNT\nlcmt.exe
    C:\ProgramData\WinNT\nlcmt.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\ProgramData\WinNT0\nlcmt.exe
      "C:\ProgramData\WinNT0\nlcmt.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Maps connected drives based on registry
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:1184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\WinNT0\ekmiowluin.mui

    Filesize

    5KB

    MD5

    3794bcb87a4b9bf2bf261cac37843f5b

    SHA1

    9c188647b41e0c1ff19fac80d667457c76b5f5a9

    SHA256

    4da154019cb156b4c8ba879879023a772f63bb9c8038b33ba3f56b2e5b7c0029

    SHA512

    680306e0032dfa3bd65da2dbb8a9c977b17b4bd51d7ff0965cca3a8fbac3e6da04058924fcc82292e74fb5f7bfa2438f1139c268d22150742789f6d2baea2933

  • C:\ProgramData\WinNT0\feteewvuu.sys

    Filesize

    5KB

    MD5

    535947d3890f2a094623aaa8645bb9d4

    SHA1

    f4f44a52a4fb38189530e996361edaf60534b65d

    SHA256

    8e92700257964caf69b5b05513623fa76b9fd519a469d1e009e13e91672ae1f7

    SHA512

    53349c79083b39c358d1b7e5333e51a8d40a516bc178a15106e34904696082a6cab656258aa3df7fdba3b3d7559837e2cd5721a37b45fc12dd7360f7e42f1d9e

  • C:\ProgramData\WinNT0\pivaaxwiuv\awh.bin

    Filesize

    4KB

    MD5

    38d950ef534e91f0d9dad0e8fbaa67a5

    SHA1

    4409ca932e0e82180f2940dbf664115bd3a8d7f6

    SHA256

    1e03db5c2b69647ed1230cb394a2f0bd511d86ae353d0da4ede792172924294b

    SHA512

    466612dfd556c71dd78552b63cee3dc50f552a9975ca2248b4d94ce83c004f61fe6c7321bb4b472835782c2ec811fc8c7cc0e3588219ba36e69f1517a75a32af

  • C:\ProgramData\WinNT0\pivaaxwiuv\equqmi.mui

    Filesize

    6KB

    MD5

    5f587d76bb26837f266739ed76ae6d61

    SHA1

    3135ad3688a52372b304cf8c253da73fb8beea49

    SHA256

    313a1b02d5719c4ed33b61f1c08d2e1c68f8ae7e4ec8bf790bcb70cf6b7c3121

    SHA512

    3427a548028f4b81c3cf5fa9fa9eac25e127c2358970a7b96b4484cbeb9566afeb16ebe39afad49d99095f14af334f21e6aa4a26ca94f734b7e51ace7559dd44

  • C:\ProgramData\WinNT0\qosowiloo.sys

    Filesize

    1KB

    MD5

    f116e6d68054f4e4a5ca80538b9f6fba

    SHA1

    b5b972370a69b1aef2f4634f9c23e7888c8d6998

    SHA256

    9a75785dd1b2b67f7b6816837e1cb188080a56b2d50025126ffa46222f64e103

    SHA512

    33e67cd76c278480ad546d89af4475c0228524e4b2270e0873a49fa3e4c48d72713838023b6af3df7fc15785d83e884f7ea76025567dc30803d87fd19c2a42fc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GF2EFEEL.txt

    Filesize

    219B

    MD5

    99a1b0216dfc467af5729dae7458b02a

    SHA1

    0dd992d764c0fb48c642db3711b0445d3b531638

    SHA256

    19bbfc1e7fc51cd6079424fb61194bb487768af3c3fb6a0695cccc11cd8ba748

    SHA512

    5c9a2de43148fcb6b05a0cebae03e7129a570328a60d17092104be046f766d02c73feba31b5625881042dab6133ddef02269b30a95e43471facc49a3f5047c77

  • C:\Users\Admin\AppData\Roaming\WinNT\nlcmt.exe

    Filesize

    170KB

    MD5

    46f5ae603ebdaa7195037c3ced63766f

    SHA1

    474dc6636a6a47576cddfc4b4004c5d95c6fa60e

    SHA256

    ec5030ef4da05957291a821570adcc751a93347d71bafdb831aa8646ff0c765e

    SHA512

    6e3767f6a4c62ab84c2b29b928d1073aee76ed09444a2ddb213e5990db5177c1841b3720c0467be9de1dc1e7713f22778fca561cced72d6742403b4112529e56

  • \ProgramData\WinNT\nlcmt.exe

    Filesize

    170KB

    MD5

    f1015b542137cfb99f39b7a5b5a0b8f1

    SHA1

    d510454d238697402ccf0868970aca053668ab2e

    SHA256

    cefb6ce1293df6d7dde56f43692fe0fe04b7e7d209075432bace4159972980f5

    SHA512

    79438085550032e3c54bc7fe0029e8de41cbd9aed8e7649aeb459ddbb482e9e5ba891d7f2d55381c9714c05b8b0c6cc31769334cb2226d99ac52995a70be2317