Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2024, 05:15

General

  • Target

    3aae5af860d2f47f0bc153f8fa450480_NeikiAnalytics.exe

  • Size

    381KB

  • MD5

    3aae5af860d2f47f0bc153f8fa450480

  • SHA1

    cabb4f61af6ae426d42258b27c456ab1d2628d95

  • SHA256

    9018c9aee7ca42cebdd775599d71707848ec3db4eee7d3e60e7b871d15cdcc47

  • SHA512

    dd4c060a204ea49b6262cc646e6ebe8b627a957d8f5eaf42921746f25a2635e8871da26ead99bf14c83b7f36cffb6db349bc31931df146ed3cdf88fb246f04a8

  • SSDEEP

    6144:XLZ/Jd7juqVo223CQjNY4T4G/+uOuKxvtpiO11y/ncfQiBIk:1/Jxj1KNXROuKh/GnQQiBIk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3aae5af860d2f47f0bc153f8fa450480_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3aae5af860d2f47f0bc153f8fa450480_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a73F8.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Users\Admin\AppData\Local\Temp\3aae5af860d2f47f0bc153f8fa450480_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\3aae5af860d2f47f0bc153f8fa450480_NeikiAnalytics.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 540
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2920
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:2612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\$$a73F8.bat

      Filesize

      620B

      MD5

      e92c7807863c633f80ad256e7a5de25f

      SHA1

      845be14874d1d79e60f54092b81cdae724289520

      SHA256

      2ffe4096ec6a5847186269f81d78dd1c0db49e9a5e0c02496808dc2f7a917f5f

      SHA512

      2a690344eb3d988684cefe5884e47ef8bba94f16d812876be62b05426c739b69d2a12f2bb9778d3a9e2258a52afcd8d7fcb0d0608cb617ac35383842e94d9679

    • C:\Users\Admin\AppData\Local\Temp\3aae5af860d2f47f0bc153f8fa450480_NeikiAnalytics.exe.exe

      Filesize

      315KB

      MD5

      ed9689986286c0a0d60b7e6bffcb92bb

      SHA1

      4dea29b5fd3e3df0c47c0f4350138d328b411143

      SHA256

      22d0773404852ce0895fc4d582674efc8e4a4f778136626280011ffc52bcc724

      SHA512

      5704069388bc3f4e4bcd0a6d9017e5cfec5bdca7b5152b0d0d069c069227c91700028a937f3dea78afca7ec07ed518a16aefa94b3bb96dd22085ffe119746895

    • C:\Windows\Logo1_.exe

      Filesize

      66KB

      MD5

      5909f0b5ede88d776e3a30ccd6284a91

      SHA1

      758db75ffd4ecfa1549e0b73b7c212af2936e758

      SHA256

      59dced98f33dd7e7853041852b61d5f591b7925e2ea58429b4154a9d6204585a

      SHA512

      b8ea963d25805e8fcb0e1ee6d05bb76b0fdae8486a2369b8181dc5a24b524f485e521fe121cde8f9bc650b9e6d2240ae6f41e7aa25cbfb895a9e8c736b6b1d08

    • memory/2648-30-0x000000007461E000-0x000000007461F000-memory.dmp

      Filesize

      4KB

    • memory/2648-21-0x0000000000DB0000-0x0000000000E02000-memory.dmp

      Filesize

      328KB

    • memory/2648-20-0x000000007461E000-0x000000007461F000-memory.dmp

      Filesize

      4KB

    • memory/2744-14-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2944-28-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2944-29-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2944-33-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2944-38-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2944-40-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2944-167-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2944-171-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2944-244-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2944-247-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB