Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 04:04

General

  • Target

    08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe

  • Size

    2.5MB

  • MD5

    08f0ca296a36d78eadbdb55db08a4a60

  • SHA1

    df2acd69d9a24ca2e7aa9adf6244b9d4fb4a86e7

  • SHA256

    d53980dafb91f586ff96100ad0eaa128f47a7e9cfdeb35c687a5f1678e21a262

  • SHA512

    a8c70a578e9bcdf69c1fab1fda96983099a9d86f97957a1134aac1cf9e3507ef267179ad5a9207f46d6d152738f6e381ed869dd98183c0d6e1a660356400a1d2

  • SSDEEP

    49152:PxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxW:Pxx9NUFkQx753uWuCyyxW

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Themida packer 15 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2932
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2956
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1632
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2584
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:2632
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:11 /f
            5⤵
            • Creates scheduled task(s)
            PID:2656
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:12 /f
            5⤵
            • Creates scheduled task(s)
            PID:2824
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:13 /f
            5⤵
            • Creates scheduled task(s)
            PID:1100
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:2828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\svchost.exe

      Filesize

      2.5MB

      MD5

      5d4270b884bc46ccc5f4e0bdcbcaaa29

      SHA1

      777ffc60ba0cf29efa8ee4c13e7cb4645dc6f660

      SHA256

      94f34826b3c7d95d9eb1b7733982137fb087980734d839988a29f4caf6e39f28

      SHA512

      f9dc02dafdda4b6e962f74d1369ea47ab3c345fca035342ab8aeb6c36766464868f2aa052bba73ae1f87ce861e6675e87a239181e1ed3e1499135f33d5817b51

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      2.5MB

      MD5

      f4a2df2da0139b9e7d6533bc4bdae8ca

      SHA1

      704ae0cf33afa085ac80f62b112d7ff346d615ef

      SHA256

      b5a6f9e12290cd6d15551147f206ad3ae5ac31a3b7c5550d879be5676022daa0

      SHA512

      fd21c60a532dc01b7e5139cda1aa2c6864e99deb35f33ed0157ffa098812724bb6a03f67b3dd79f841ba554d238a33b9d9d4feebb61fa6e5d3cc1df53fee79b1

    • \Windows\Resources\spoolsv.exe

      Filesize

      2.5MB

      MD5

      efbeba9af482bea52da165e4eb46f98d

      SHA1

      03956cbbe65f57c6b6e7a0f17441fc304b06da0d

      SHA256

      3947d96f3e3cba8c61383408bb1e1a141c87a858ee401262ec432eb016c2be13

      SHA512

      6d88c24f7434115197e201eb4d61cc9c8d23c7e1ccf8087fca24140acf34e9097be1921e63dc7da96dde8b7f4c96d6156ba016d6805eb635a633ad6e985912cd

    • memory/1632-24-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/1632-51-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/1632-35-0x0000000003620000-0x0000000003C2E000-memory.dmp

      Filesize

      6.1MB

    • memory/2584-36-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/2584-43-0x0000000003300000-0x000000000390E000-memory.dmp

      Filesize

      6.1MB

    • memory/2584-54-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/2632-50-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/2632-44-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/2932-52-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/2932-0-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/2932-1-0x0000000077610000-0x0000000077612000-memory.dmp

      Filesize

      8KB

    • memory/2932-11-0x00000000038E0000-0x0000000003EEE000-memory.dmp

      Filesize

      6.1MB

    • memory/2956-23-0x0000000003640000-0x0000000003C4E000-memory.dmp

      Filesize

      6.1MB

    • memory/2956-53-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/2956-12-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/2956-63-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB

    • memory/2956-69-0x0000000000400000-0x0000000000A0E000-memory.dmp

      Filesize

      6.1MB