Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 16:58
Behavioral task
behavioral1
Sample
769aad21a347b7576895910e55970390NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
769aad21a347b7576895910e55970390NeikiAnalytics.exe
-
Size
43KB
-
MD5
769aad21a347b7576895910e55970390
-
SHA1
36831993993050af72ea201cfa6ebc4726860e56
-
SHA256
72e0f8bf690b647ae965d9a99f89c4f04c3b9500aac53f2a3fd376a2546b287a
-
SHA512
9bb36a376f0b3e8a26a813f1054bf92a9ca737bd9eb96403d28b4edb81c361408a058e5ccefda3e44bbf4943d9799203665161b02394d35a05faa20851f670a5
-
SSDEEP
768:d/jqPyqisr4dGirXAHg5rbWDdJwtZ69e7Sd/bDXNJb7bTDa/o1IV27C1:tNqwohJKZ69eKjBJb7bT2o1IgC1
Malware Config
Extracted
xenorat
192.168.1.219
131313131323
-
delay
1000
-
install_path
temp
-
port
1234
-
startup_name
Windows Client
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1984 769aad21a347b7576895910e55970390NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2012 769aad21a347b7576895910e55970390NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2684 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1984 2012 769aad21a347b7576895910e55970390NeikiAnalytics.exe 28 PID 2012 wrote to memory of 1984 2012 769aad21a347b7576895910e55970390NeikiAnalytics.exe 28 PID 2012 wrote to memory of 1984 2012 769aad21a347b7576895910e55970390NeikiAnalytics.exe 28 PID 2012 wrote to memory of 1984 2012 769aad21a347b7576895910e55970390NeikiAnalytics.exe 28 PID 1984 wrote to memory of 2684 1984 769aad21a347b7576895910e55970390NeikiAnalytics.exe 29 PID 1984 wrote to memory of 2684 1984 769aad21a347b7576895910e55970390NeikiAnalytics.exe 29 PID 1984 wrote to memory of 2684 1984 769aad21a347b7576895910e55970390NeikiAnalytics.exe 29 PID 1984 wrote to memory of 2684 1984 769aad21a347b7576895910e55970390NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\769aad21a347b7576895910e55970390NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\769aad21a347b7576895910e55970390NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\769aad21a347b7576895910e55970390NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\769aad21a347b7576895910e55970390NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Client" /XML "C:\Users\Admin\AppData\Local\Temp\tmp12B6.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b59daee9e9ee2d3e3d57ca2b3fc22b5a
SHA14cdd2c0591cf11cef17cfdf36a05bb35b12ad5f3
SHA256a556115d39df2ce8f486715c125907b2bd8d21299b47e519b50cde701bcc431f
SHA512b5a20011703a63404f8bf74f315fc0c42cd95084229f41ab2db9056e8c7e4923ab93046d351b7390fe50044b3b424e193efffc0113716fc29bfc037ef17cb5bc
-
Filesize
43KB
MD5769aad21a347b7576895910e55970390
SHA136831993993050af72ea201cfa6ebc4726860e56
SHA25672e0f8bf690b647ae965d9a99f89c4f04c3b9500aac53f2a3fd376a2546b287a
SHA5129bb36a376f0b3e8a26a813f1054bf92a9ca737bd9eb96403d28b4edb81c361408a058e5ccefda3e44bbf4943d9799203665161b02394d35a05faa20851f670a5