Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 10:35

General

  • Target

    0e217d9345c5d9267e2e793f618c7730_NeikiAnalytics.exe

  • Size

    24KB

  • MD5

    0e217d9345c5d9267e2e793f618c7730

  • SHA1

    789241baef5d4d6b413f3093cb95c3807e627ed2

  • SHA256

    c1884c59389620e398c738bd2c0bb44d7dd1deb327dddf690edf67432eec8bc1

  • SHA512

    e23e41120ad2c46d62af002a5cdd8827531347dfea1a3c7ef31acda9fe2d1beae556073c311d3975f844e9c5f091e58dc7ff4edff4832da655173fa65e8a16dc

  • SSDEEP

    768:CnpnIYh43Dc3GbWXLFaun5jfkcha1MbTY:qSq5jMca1MPY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e217d9345c5d9267e2e793f618c7730_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0e217d9345c5d9267e2e793f618c7730_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c79699ef69074811d184ab8b3a29801

    SHA1

    6ca24405f59110802944789056cb59ae7b600b0a

    SHA256

    3f07ee49d1cbde10f2d09f1119876f69cd96f5127c24d2dbd57c2a7da5409f9a

    SHA512

    2884fb4ab7fb9a362fb17f0439a7a6d8540abc91a3a2884e6e94a050107b7537a63077c03888f2bd2e913740ad658060cc0344f72e762486dcd7c6c3d1940312

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    074ca0ffba752653e089cb9b2a02dae5

    SHA1

    24e750d3ae092a67eb6654fd957878516c455ac5

    SHA256

    0e3f06cb6bd3c5a27d8f6183ffe67e502bebef9c6c589a5a23e759efb49aec3b

    SHA512

    3b9231c8f3eafdecfd0bd9411142d48ee65e4188fcd38c5f5d6c305e7c5827cfa2e888fd81396aee2171a8bc2eb0e8ece784a92d998a743169455c890d80872a

  • C:\Users\Admin\AppData\Local\Temp\TarC17.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    24KB

    MD5

    8c3a94bcd0ab14ca7ede5485a266c170

    SHA1

    f5b2f14efddad4007fa3f43fb3d317729f31331a

    SHA256

    873cbc26aa07857129c80843c2a472179804160bcfc61c18afd22b2e8643debd

    SHA512

    2bfc1502fb57d59d776737f052cbc923c8bd90cf5987089846bf6743e480957f162641d1ba72006b4c12b190fda53b49e7a8f94ecadc52e27581f88ae3f3c950

  • memory/2848-13-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB

  • memory/2848-14-0x0000000002E60000-0x0000000003260000-memory.dmp

    Filesize

    4.0MB

  • memory/2848-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2848-157-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2916-6-0x00000000031A0000-0x00000000035A0000-memory.dmp

    Filesize

    4.0MB

  • memory/2916-9-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2916-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2916-2-0x00000000027B0000-0x00000000027B1000-memory.dmp

    Filesize

    4KB