Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 23:11

General

  • Target

    2e5fd712c7d1d156bf6c56933f4c49db8ed1f83804b35c64260e93cb30cde855_NeikiAnalytics.exe

  • Size

    2.3MB

  • MD5

    c8d10638d48535fcd5b79c9efbc35280

  • SHA1

    6d87ad1bd3ffc2845c4c4f14d1e3a6c49e917c1e

  • SHA256

    2e5fd712c7d1d156bf6c56933f4c49db8ed1f83804b35c64260e93cb30cde855

  • SHA512

    47906454d26f8554b35c89ed256a79c2c19325ccae815fb7ea0649337572cc760e2cb3db5f669a3d91911f4827bed2a9be27c76623d029ecbb0b3e920f7bf955

  • SSDEEP

    49152:4jvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:4rkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e5fd712c7d1d156bf6c56933f4c49db8ed1f83804b35c64260e93cb30cde855_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2e5fd712c7d1d156bf6c56933f4c49db8ed1f83804b35c64260e93cb30cde855_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    5adc7a569067ac8fe0522d37a5a609fe

    SHA1

    5540b7da790889be328deef0d22c5d5eb14a250f

    SHA256

    941ff709c0b1224fe2c015d0b78e352d9320c1c66ecc7788c310142e9eed0256

    SHA512

    bc0753ebe29e40d9ee7463955e0b854c0992ac2ea79b8b8d0f9ee4e9e88a2b0105644ad9f9d949d8593f8812f156174da3f4d5a2aae2bd025db0738b96674d8c

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    2.3MB

    MD5

    71c365d09e9ff89ab373e74ee2d75d51

    SHA1

    b5f51e1ecc6de520a73516cca870dc83a59fe21b

    SHA256

    415c2d624874a9e668abd3bbfcb6d11fea7377426970b8a7b098b6b64dcc04de

    SHA512

    71528c6dc68fe8c941f767d2422bf1bc3c5669c7719618cdd91c1a7c1bb4043d44c35145dc5b0aa844e9cf25ef5a4beb485337c4bde5752570bd9166f71479f7

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    3bf86f470e68b29674bae64e14e1ae58

    SHA1

    db194f47eee9011f528fa3dad5b207fd5f370f07

    SHA256

    db4edb19d320e6fb39ee5187c9461b42ed8fdd98e5b69b1d2977d3b972128205

    SHA512

    e5f075812cb00f058f560ac26e6229c22364e893e2286104d0717b95f072706d25575d8d1ed9b0d7aac39f60418ae7d88e0edb0f8fcc1ee093b9354ba8769ac3

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    44ec2279e62ec3834b6346e341f396e3

    SHA1

    0ad902f0ee6b29d5fbacc2434d3d564148d091ca

    SHA256

    25cd3ddfdeb95cbfc6fc497b5bd79e17804c25db452beac2c033bb52137cd3a4

    SHA512

    3ec64d614abba8b9142e4fe948c8d7df20cd52a8f99cfcc62585b931d8bb4c3b1a01bfe3ec0b3fee2678fd0c8439b0778ff84eec6e75ecc0e0fb679f77f585b9

  • memory/2620-30-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2748-59-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-50-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2748-73-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-71-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-69-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-67-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-65-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-36-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-37-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2748-63-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-44-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2748-45-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-47-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-61-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-48-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-51-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-53-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-55-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-57-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2936-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2936-28-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2936-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2936-17-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2936-26-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2936-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2936-29-0x0000000000170000-0x0000000000179000-memory.dmp

    Filesize

    36KB

  • memory/2936-20-0x0000000000170000-0x0000000000179000-memory.dmp

    Filesize

    36KB