Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 12:09

General

  • Target

    315c6b95b9b034bde36b257a44544910_NeikiAnalytics.exe

  • Size

    464KB

  • MD5

    315c6b95b9b034bde36b257a44544910

  • SHA1

    febac56767aa538696615331941853ea5ef32ca4

  • SHA256

    b0d32547afd235ceab445a7ce105bb0391eef1e5060b2098bfdb75f8007354cd

  • SHA512

    4cd6dff12c4da5f87bdedc9779f70b76067433a332eeb625a4547739b481631edd75947b584151c64189319108bd2c438c7d69aa248b90579737d327c9e432fa

  • SSDEEP

    12288:LxotTiah2kkkkK4kXkkkkkkkkl888888888888888888nusG:Rah2kkkkK4kXkkkkkkkkK

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 26 IoCs
  • Executes dropped EXE 13 IoCs
  • Drops file in System32 directory 39 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 42 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\315c6b95b9b034bde36b257a44544910_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\315c6b95b9b034bde36b257a44544910_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Windows\SysWOW64\Mpmokb32.exe
      C:\Windows\system32\Mpmokb32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\SysWOW64\Mgghhlhq.exe
        C:\Windows\system32\Mgghhlhq.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3496
        • C:\Windows\SysWOW64\Mjeddggd.exe
          C:\Windows\system32\Mjeddggd.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Windows\SysWOW64\Maohkd32.exe
            C:\Windows\system32\Maohkd32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\SysWOW64\Mjjmog32.exe
              C:\Windows\system32\Mjjmog32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3960
              • C:\Windows\SysWOW64\Maaepd32.exe
                C:\Windows\system32\Maaepd32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2928
                • C:\Windows\SysWOW64\Mdpalp32.exe
                  C:\Windows\system32\Mdpalp32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:760
                  • C:\Windows\SysWOW64\Njljefql.exe
                    C:\Windows\system32\Njljefql.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2528
                    • C:\Windows\SysWOW64\Nacbfdao.exe
                      C:\Windows\system32\Nacbfdao.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1940
                      • C:\Windows\SysWOW64\Nklfoi32.exe
                        C:\Windows\system32\Nklfoi32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1948
                        • C:\Windows\SysWOW64\Ngedij32.exe
                          C:\Windows\system32\Ngedij32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:3124
                          • C:\Windows\SysWOW64\Nqmhbpba.exe
                            C:\Windows\system32\Nqmhbpba.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:5116
                            • C:\Windows\SysWOW64\Nkcmohbg.exe
                              C:\Windows\system32\Nkcmohbg.exe
                              14⤵
                              • Executes dropped EXE
                              PID:2504
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 412
                                15⤵
                                • Program crash
                                PID:2784
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2504 -ip 2504
    1⤵
      PID:4932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Geegicjl.dll

      Filesize

      7KB

      MD5

      33f78f7d23266bffe60843795b48e1d0

      SHA1

      73309fb31b962adeeff7258eaf187af86969d52b

      SHA256

      1692d60c8993293ee64df19da1c523c9045ac97a7db370378febd11c190ebd7a

      SHA512

      a1ec4d45937cd07ce15f02608182c0d4c3d5c90bb9c7d9cb5379823217e0c3768465aeee0a4a637d74507ed23eb117ba269bbbf6ab9bc0390f349643136eea3d

    • C:\Windows\SysWOW64\Maaepd32.exe

      Filesize

      464KB

      MD5

      758707e202801a9ed218959ee1aedeac

      SHA1

      91a2593361bc43b81ed6d8bddff1cc2ff8d04974

      SHA256

      8e293930ffdeb42887cf1749ad7be67ac67e9a346a07d3b22967c4ef2a21f2e3

      SHA512

      609696a0d2f43aec2551c42556ca9fe4b085da046db27d77d55bc8333e668de9367168c2338a76f4572d0fc6ab9f509b5c3eb041eb7b91ff2f1f4c063658d95b

    • C:\Windows\SysWOW64\Maohkd32.exe

      Filesize

      464KB

      MD5

      4d5113f9ed0093495afab4febadf6277

      SHA1

      e6551ba1dfd6ab6eb6ee916236321fd7aa696a14

      SHA256

      fa9c0080d22fbd58ecc1ce3a55fbf2ea6fa1c59e144ed4393d74a005783902c1

      SHA512

      13262bf5714c1cbcb8fffdf445e1d174daa363badd60995e6de22f604770803ff724d6a5d39b1723c607efb7de66b93fa0f432f39cd498cb88f203a90b1f5cc8

    • C:\Windows\SysWOW64\Mdpalp32.exe

      Filesize

      464KB

      MD5

      519722f4e865f45fa663c9a86655bbff

      SHA1

      ae88f5f5d4020965bb404585aa5dcc9933fc799c

      SHA256

      16555ec1464950e58837ee0b65a8ec5b1617a66c4711c3d344c85a416677a2da

      SHA512

      b6a32d2d6953fb10f8ea47ff6cab1fd89dc622a2463c0125b2f571fbe98a4c83ad07711110abfc68f59711c3e812eaaa90eca8984f49fab02bd5518299f5ef81

    • C:\Windows\SysWOW64\Mgghhlhq.exe

      Filesize

      464KB

      MD5

      4cd64c101738e6c63c69766fb8bfd0d3

      SHA1

      f53636374280269ac4f4de3c26bbe1d249510c32

      SHA256

      507576f1af73b4e29214b7cf47a7329567979d40ea8ac9ab2844d3a22f86aa47

      SHA512

      cbab3035ac955d29929ca2a35ae1a908724ea08f72cbffdab4bdbd83071a82d578246ac389569a8ddb91996d6abb376425597bf2ac9a67f273410f0f706e900a

    • C:\Windows\SysWOW64\Mjeddggd.exe

      Filesize

      464KB

      MD5

      9980cd8ea30abfee1091d62bb4b95235

      SHA1

      46b4030ab374b28055918e1d82bf8633df72324c

      SHA256

      ef6cfc33f4601ae13b4ed96447b2d671e5888b230a2210d18dc9d514d43cc526

      SHA512

      aec401b4e1b8e9d23679a7a7bff80dd74008aa64bd8eadec016ab321011c4d11217e83ae716bc4ab8bad3319bff34f83b6fe4387e927aab4ebfdb6e4da0f3eb1

    • C:\Windows\SysWOW64\Mjjmog32.exe

      Filesize

      464KB

      MD5

      e4ea190981deec158e72bdc0d1b1b426

      SHA1

      957edef836b79a6209d9d1c0aef7275bfbb96025

      SHA256

      d67772c247274ab42f82de6be5feef8668b9477ea4d9967c2e1b0bf77c994fb4

      SHA512

      bf7238ac0374b01755db7c7aa00251e67f9d0fd457032fdd8ee5bd125e60abfc0b1d9527e7bfd8d34ad36d0ae551f9563033c3cbd9e72b45ec15461a89b49f45

    • C:\Windows\SysWOW64\Mpmokb32.exe

      Filesize

      464KB

      MD5

      61b8846c5a0027b0493c1379df03d3a8

      SHA1

      18f24f987d30f0ff798078affe692f388e16fd31

      SHA256

      bb5b146ea9a0925ae815c707e84dd17cc7b0f6e9e746c0d26e03d478aaff7120

      SHA512

      f0536d382ffcedb6b28edd72f7b5df0d6414d4fe79ac1cdb1a6be8311008206638ba89029c194a3b1e988cc9b998cb32469b29f74e3cd3b00681e2dfb2a67d65

    • C:\Windows\SysWOW64\Nacbfdao.exe

      Filesize

      464KB

      MD5

      8ad257dfa1f6cb7a289bfd4117bb2d14

      SHA1

      ce4ca5c694a6632eadaae875c1f524e917aae332

      SHA256

      d1f5c773bd171454833c96215068d656e420d0ee2a20dbe03baed6ecd47fe61f

      SHA512

      199e633fcb86d664cfcb73d18f251d6ead2b20e9acc3ede217a8bb7157f6540965f605fa90d1eb3f3befbda99372d19b27dfc5f6d47c9789ad2a838c325de533

    • C:\Windows\SysWOW64\Ngedij32.exe

      Filesize

      464KB

      MD5

      6fd08e8869c0c271464f888cd3955fc4

      SHA1

      87735c1b0c92c0f9276dd4266df6ac7f34cfe684

      SHA256

      3851eeaac258e0c1d05c113c2fca1dd6b04e14e8243c776204bf50e8a8aa5169

      SHA512

      7dc1bf312fc631d41ed063d4060b0c8b039265f442aeb57c4e680232275ef37e02a3a01b9981a7a1206d95d71daeffda3fba6fd1c1411169dd3e8a5856446e83

    • C:\Windows\SysWOW64\Njljefql.exe

      Filesize

      464KB

      MD5

      e7beb7e475a8d8a215212eeb6a2862b8

      SHA1

      0da20f413c219d2e12aa564893e8d1f378627bc1

      SHA256

      c11d35e6ee9a2c3060e839cb3d0302dcf47801391604f45bef8b6ffbfecb843f

      SHA512

      9f0dc4dabed79048ac430cc1ebe8a45f48309377c7b5a0c19522d4ea01953fead2196b8931b5a82052a87987f03346b84da8074bcb9cb43435210a38a8df103b

    • C:\Windows\SysWOW64\Nkcmohbg.exe

      Filesize

      464KB

      MD5

      864835524095ae4400920a3cc37d2cce

      SHA1

      32f4a459c53512a371d438d432bc8e95baecb6f1

      SHA256

      1b09cfed800a808f8b171c050db6e132ef8701206602fd08f06def5b2ba8a971

      SHA512

      e3cb23e9306d26bdd22c101d87119c21ec2339340615435f6f15f834c96bf4b7d8e1725e38818e650f0117d44ce2b20d4d1a3b482e9fc515af7ff61116104550

    • C:\Windows\SysWOW64\Nklfoi32.exe

      Filesize

      464KB

      MD5

      b7400495b0946c2081878b4a9e72f2d0

      SHA1

      f1e4429254b618a7b7c8abbb2179c96713797bc2

      SHA256

      fea170d76db01dd36666bed900fd83138d74b6438ba2e4b3fbdbd942c8cd4a7c

      SHA512

      15e8937a8c8c0e56bf4a863edea044db3a61fe30b3164985cc24aa27611e82fa2f33d9250193109f6349a35707dfca0858f02c79b7da2fb5b3fc8781d6644555

    • C:\Windows\SysWOW64\Nqmhbpba.exe

      Filesize

      464KB

      MD5

      5ffa402c1766697ae4aece6f7cfabd6b

      SHA1

      6c3e226c02097b6634c41b48d83ff9755ece7e13

      SHA256

      d8fca2b883dc590009a02c1a7cfb0cd70eefbd4df8178d737adedf36fe895b8c

      SHA512

      4d28bebe6942f6262349e6f8cb648c3950d6acafcc630740e160ce57f36ff64ea9e281b3ae5afeaf72a67632944974c77db778788532c3e9701011802ea96422

    • memory/760-63-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1532-119-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1532-32-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1732-121-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1732-24-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1940-76-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1948-110-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1948-80-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2504-104-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2528-64-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2528-113-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2928-48-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2928-116-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2944-7-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2944-124-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3124-108-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3124-87-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3496-16-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3496-125-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3688-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3688-127-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3960-45-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5116-106-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5116-96-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB