Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 18:12

General

  • Target

    052929843e0a7c31eec345051ace63173d87bce5b8fdfd98ea2aeaff6d255db7_NeikiAnalytics.exe

  • Size

    352KB

  • MD5

    d5df833c0ce25ac076226cc6d3a37f40

  • SHA1

    9b969bb1429394b73affb775ed48e619955e871e

  • SHA256

    052929843e0a7c31eec345051ace63173d87bce5b8fdfd98ea2aeaff6d255db7

  • SHA512

    dc82bf4731c7569cf1670c893e6d207e1da125ddb040c335dd4cb95d5788a079820530cdc3a22091f075556627a25136f1bb967a5911ba9c5a82d4ff7f4d26f2

  • SSDEEP

    6144:cIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:tKofHfHTXQLzgvnzHPowYbvrjD/L7QPs

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\052929843e0a7c31eec345051ace63173d87bce5b8fdfd98ea2aeaff6d255db7_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\052929843e0a7c31eec345051ace63173d87bce5b8fdfd98ea2aeaff6d255db7_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    a6e2529cba960c2f66b3f324aa62e99f

    SHA1

    31bebf2ab83cc42a2c5bb2239af5928a1aeab39c

    SHA256

    a75ba92de3263ca2a9864a13b30d34668ddb53e0fe08372b485760be52a6cd2e

    SHA512

    65a96f46080d163cc62f3d3599d3992b76be98cd597a981597be11f1c4ec07dab2b6445b81fa951f25e3660cf8571ed5869328f642cbb24851e2cb4729871efa

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    352KB

    MD5

    5696d22cc02058cf17a86f89fd96802f

    SHA1

    62c354165636f184a60035d805f8aacef9fd54ae

    SHA256

    1bf7dfaf85c08ce8d71a5136f4c7c3ff2b3919f245970869aabe7a43720baf67

    SHA512

    9af5a963b979db71d7b63d42e2e750572bd3ac74466f9a390403759b697e9aa8a374bd9f0c3d0493ff4e6f5787d1c4cf15f954e8635e7fb9db3e3bd4ec1b76b3

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    47085627be51978b9d9758941498d414

    SHA1

    32b05cb7bbe82286276a430012bf46b13a35eea7

    SHA256

    c64bc5c74be96aa420800e76b5be8e9fab9a63ad9e97668fafc39effc6d2443f

    SHA512

    413d995607f15fb78ad908195c39b1f5432b3c9d8491e4f7441dc38a04931a5e7252e6c5caf59e0b0a9f21827d041e1b783cb0b586ead1cbca378f3b1fbd5c83

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    df4d1fa23de0655a8a462ba2168c46c1

    SHA1

    8a335aa7b02ce1327eda570f092a6082d96216a7

    SHA256

    711dae2fbfde90d072e5fd1b51416f0fc781aba463b41f375b4178b4946a732e

    SHA512

    db1b39152ea824800a6a85e0811b7631c2509cbae20ddd6cd20bc8c59a00684fce492db5019dbcaf8bf65c9450f82af669de73a043b621b2f1eb3ee25ea4e286

  • memory/1208-26-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1208-30-0x0000000000320000-0x0000000000380000-memory.dmp

    Filesize

    384KB

  • memory/2212-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2212-0-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2212-27-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2212-18-0x0000000000380000-0x0000000000389000-memory.dmp

    Filesize

    36KB

  • memory/2212-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2728-34-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2728-41-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2728-44-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB