Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 21:59

General

  • Target

    8a4010ab205b0d866e3569278dec80d0_NeikiAnalytics.exe

  • Size

    95KB

  • MD5

    8a4010ab205b0d866e3569278dec80d0

  • SHA1

    34feead405b1fd554fa826fd712bb1addc10c4e9

  • SHA256

    ba898f05f347722f00737f2e70d80daa934c102142154ff2a7208a5ae2f4000f

  • SHA512

    1b34ccf7377f778529d87ed57fb9b1be851d912a11e61f0c44f632781598eaff68fe61cacea2fa81a5baf808b7a356e0e81bf74b1441dc941ecf3c0767122e87

  • SSDEEP

    1536:EGqRGbQHSgOTw1BFxnsUdsdBhMgxRFy2kckEUEVvccRPAAXLSYPph/ATvYSByU65:lbjgjXxdWBhMwRFy2Rk/kcIAebPph/AO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a4010ab205b0d866e3569278dec80d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8a4010ab205b0d866e3569278dec80d0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\WINDOWS\VWFLH\rMX.exe
      C:\WINDOWS\VWFLH\rMX.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo 0>>c:\windows\nk.txt
        3⤵
        • Drops file in Windows directory
        PID:2396
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\WINDOWS\VWFLH\rMX.exe.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\WINDOWS\VWFLH\rMX.exe.exe
          C:\WINDOWS\VWFLH\rMX.exe.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c c:\51.vbs
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\51.vbs"
              6⤵
                PID:2480
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\72.vbs
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\72.vbs"
          3⤵
          • Deletes itself
          PID:2484

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\51.vbs

      Filesize

      162B

      MD5

      c62dfa660bac6895cf009e2e33265347

      SHA1

      c0ca35400dcd7e7db069d63f08169adef99b1f6b

      SHA256

      8db28e197fe38cb938ac70cf19d4be19ed1a9e6386cc7fa5c67566928b00a73e

      SHA512

      683f8f388f2392413b980777539d4db12fcccea7fb752bebdf4f40f21164a4e5a02d5ac1c8b02fdc74698587de179753c027b0a74ae915724a2af9023803245e

    • C:\72.vbs

      Filesize

      219B

      MD5

      94b774463df9e48b3c5ad4a51af55285

      SHA1

      962d59e4991e4e81af9434d5f0f4c816c9e93592

      SHA256

      7180e26bc9c741a5d2d05ca32260d8defac1326db71ade7c7943114a450d3289

      SHA512

      a0bf8c6f25d2cd9eed91972b567c53caa9fb8d634fda65a4f2ba5b7f927178a2a2876da86dddc28a8a23d465756ecba6b78734f210d8050a852f4b9a4430c570

    • C:\Windows\VWFLH\rMX.exe

      Filesize

      95KB

      MD5

      8a4010ab205b0d866e3569278dec80d0

      SHA1

      34feead405b1fd554fa826fd712bb1addc10c4e9

      SHA256

      ba898f05f347722f00737f2e70d80daa934c102142154ff2a7208a5ae2f4000f

      SHA512

      1b34ccf7377f778529d87ed57fb9b1be851d912a11e61f0c44f632781598eaff68fe61cacea2fa81a5baf808b7a356e0e81bf74b1441dc941ecf3c0767122e87

    • \Windows\VWFLH\rMX.exe.exe

      Filesize

      95KB

      MD5

      b55ae59c75ecc6cd08a8a19c11ce292d

      SHA1

      842414450e85bd60722e275d5702bcb0e8cef183

      SHA256

      e42cfede4d9e51f5f27e88def0a7c3d1064bdc9dcf0529741b816deb4fd84e18

      SHA512

      4fdb68561cd07d72e7caf1ff7e9728ffd8e27bf9c7705e43d511aa0c4b6aa859ea956c893f493ca5cc53255df4bc42512e3356a3f9102b9538eda15aa8253def

    • memory/2356-15-0x000000007EEE0000-0x000000007EEFF000-memory.dmp

      Filesize

      124KB

    • memory/2704-28-0x000000007EEE0000-0x000000007EEFF000-memory.dmp

      Filesize

      124KB

    • memory/3036-13-0x000000007EEE0000-0x000000007EEFF000-memory.dmp

      Filesize

      124KB