Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 04:04

General

  • Target

    08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe

  • Size

    2.5MB

  • MD5

    08f0ca296a36d78eadbdb55db08a4a60

  • SHA1

    df2acd69d9a24ca2e7aa9adf6244b9d4fb4a86e7

  • SHA256

    d53980dafb91f586ff96100ad0eaa128f47a7e9cfdeb35c687a5f1678e21a262

  • SHA512

    a8c70a578e9bcdf69c1fab1fda96983099a9d86f97957a1134aac1cf9e3507ef267179ad5a9207f46d6d152738f6e381ed869dd98183c0d6e1a660356400a1d2

  • SSDEEP

    49152:PxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxW:Pxx9NUFkQx753uWuCyyxW

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Themida packer 15 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4772
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2064
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4744
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2552
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:3772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    2.5MB

    MD5

    6f0595c7e81d0a31bda831f42f38153d

    SHA1

    0b8d0503e5316c829e026fd6b079afdc335c2a6c

    SHA256

    2ddc6035caf5e87f8c7260dc47856c395956d4dfd9b65af3b1947a2410e3a8d7

    SHA512

    1b3fef0d57f6f2d448c24514904fa2a59018a5d1ea0e9db9e39e74885442fd45e7aa31b90096ec62abc7f5b61c4f8ad319dccc37214cc6d29192f2c48d98881a

  • C:\Windows\Resources\svchost.exe

    Filesize

    2.5MB

    MD5

    69c24f30deeca6a1407a9661bcf35d86

    SHA1

    398ebe3316172012a4b31d740e4bde46f77153aa

    SHA256

    853196cce59b8fd8aef5d7933760289f0aa0482233aeb57d609af6d9527f2ab5

    SHA512

    62444976f528bb362028a4ac316c7203eac8554e8eb4a24e88d304900bb418d6694c681e93000c6fb472446e126f2b21f18398633cc56628c51eeefa17af1f12

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    2.5MB

    MD5

    c43fcb705146e39f1461b2538cb7f234

    SHA1

    6c2d1de7874f0c17215ad1fc92c83326cf2a1df4

    SHA256

    a0c4d86b676c21279039cb26f9d102374bd8de50e8b0c60e6818deb654a0a3e9

    SHA512

    7f7f499c61970c002ca17bf4cceb14f8aff5d2e6ed70b0b1b5cf98b0749ee08ab788af9845b3cf661c55999bce98b48654ff9dde2b941d568251362f0359e247

  • memory/2064-42-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2064-10-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2064-48-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2064-54-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2552-28-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2552-43-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3772-33-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3772-38-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4744-19-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4744-39-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4772-1-0x0000000077AD4000-0x0000000077AD6000-memory.dmp

    Filesize

    8KB

  • memory/4772-41-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4772-0-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB