Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 12:31

General

  • Target

    ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe

  • Size

    150KB

  • MD5

    a218db59526521a9e2e6f5ff3de7a3f0

  • SHA1

    572075ecad019a5d89f2808996c5f8a17cc60f45

  • SHA256

    ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab

  • SHA512

    e0c3e977b4e6d52b58c7115b9b7d76519ee621abd71849777615a640f3fe2c8156a1183b2622153cf187a2ed895883e9d1b5f2561c02260c80deadf5ebaeaf3e

  • SSDEEP

    3072:HuuczBGY3j4nLXhfRf70MCRRb85TFcMo7xQGHMOfAVTzXW:HlcEY3iLXXgvRG5TFZoFQaMrHX

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Suspicious behavior: EnumeratesProcesses
      PID:4692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    150KB

    MD5

    f12e2ba96194bdfc343627bd2dc6fd12

    SHA1

    ab3bbf4ba89a29b2139f1e94c88fbdde7f5a67c2

    SHA256

    11597e1bb08a45426cd37a2c90c914f1a81d5d93f15b7c00f574443391b21d17

    SHA512

    8a0da2d9ea72522f10e31b6bae7577807d1f4260479e92c55996a13435036f0474506db786dc5db7976bee4ae4fc185aa2629502ecc51dddccf0d929d5453912

  • memory/1388-11-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1388-1-0x0000000002080000-0x00000000020B9000-memory.dmp

    Filesize

    228KB

  • memory/1388-2-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1388-13-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1388-12-0x0000000002080000-0x00000000020B9000-memory.dmp

    Filesize

    228KB

  • memory/1388-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4692-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4692-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4692-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4692-18-0x0000000002740000-0x0000000002786000-memory.dmp

    Filesize

    280KB

  • memory/4692-19-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4692-20-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB

  • memory/4692-24-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB

  • memory/4692-22-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB

  • memory/4692-29-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB