Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/06/2024, 06:15

General

  • Target

    934c6395fdbfaf3618cd75df51678720_NeikiAnalytics.exe

  • Size

    206KB

  • MD5

    934c6395fdbfaf3618cd75df51678720

  • SHA1

    c24a012dc29e5d927a0ce107c5b68357faa4404e

  • SHA256

    8c1446154d9ff5adfad2e4cbccf641b5e105e4cb820feb842c2d793e70b0e6f7

  • SHA512

    86c1dbe6a66ffa7e81495891f56d84a2e93cb9c21ece76fc72f436a581558d5c92fe1bb2e2c87c41b76021f8c4d0f4350ad14fb9d7cbdf2aa58bcd446e1e794b

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unY:5vEN2U+T6i5LirrllHy4HUcMQY67

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\934c6395fdbfaf3618cd75df51678720_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\934c6395fdbfaf3618cd75df51678720_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4440
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3876
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4496
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2824
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2448
          • C:\Windows\SysWOW64\at.exe
            at 06:17 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:3892
            • C:\Windows\SysWOW64\at.exe
              at 06:18 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:768
              • C:\Windows\SysWOW64\at.exe
                at 06:19 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:1728

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          9133c741a2ab6d70ecfb2539fa5ffe27

          SHA1

          ce79c1307a521cd893ebd5d0d9fcafe52c29cfb0

          SHA256

          3ce0ac10554a650e6c80919a001a0e685e8270165c9a7d0235cf86a5fba05e0e

          SHA512

          9ee78f3f711cb2ab4b41d3a20e5c4a32569868e8a2de81f8b4535d9463b84e4b8ce1a2cd09bb7c9aeb88aeae6754e88d404b644e9bb100f78b9002715a084768

        • C:\Windows\System\explorer.exe

          Filesize

          207KB

          MD5

          d57f25cf4e7a8f499dd4a2019cef6469

          SHA1

          b288e145ab8bd3981c78589e9222ea7782bf009f

          SHA256

          66f928a7839ac4efe6618534a8e42160bd86d4c81f76a629d9ada3e0e5918ee8

          SHA512

          cdaeeb01a2e7e79be5713f2f5d66c06e3ae82ea09d0a3204bef2311526009af2ee90571922169ec8ab55977b8b9e11d7c3fb931ed57304a4974f7b2ea045b44a

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          ec30f99dcabe16266e219f152f4485c5

          SHA1

          e63096717c416c0463ffe1a3ed2cc65bd2a4cbf9

          SHA256

          90a29fe2b9114093503d13d31b57ce70fe0f810c733c2ebdbd2904f9f5331209

          SHA512

          3eb59367d7a6ae2faf3ee57150b81e4b4643bf20050c4c4006119bacf2ab2edc537a6ce3b0d6438a7ebaee9e1b730b51a23a5689e7355bb5fc23c69a59f0304b

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          9da3f58f6593e37c2b088df91b70c91a

          SHA1

          63bd4dbf41b337baf78b7a43f5e5c36caa306463

          SHA256

          184e3d24a29c87e3a456092ef57a57c26f13586efe88f045c6b1aa87bc08121f

          SHA512

          0041c467731a6ffe4473de3f8737237f470ead6113e61fc5b7bb616686fd8da0ce56e785286cb21de12681049568b8d042cf951aaa4723c96dc540e1fa8fb077

        • memory/2448-35-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2824-27-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4440-0-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4440-37-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4496-36-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB