Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe
-
Size
206KB
-
MD5
45c31bef2b57559db7f4234e644fd700
-
SHA1
524f7f37a01019512c0517400a55d9dc65a51288
-
SHA256
e4247f68fc3df6054421de7cfd68e2805eb1fca89ecdc8953149eea82c2afd80
-
SHA512
b35c650a3d016b36b6dd821530d604220f649f41fe359e7233488b9ea0eec39898894fbecaf41b509ca7881625ffd9b1f6692e2a2db15d6f64944d0067d314bd
-
SSDEEP
6144:j+EqFQ9A9ty5bhJcrs0MurPw/c4hd/B/coyXT3nOGX6T+:j+U9qyFhJy56d/eoyXjn9W+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4928 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d15a2f6a = "C:\\Windows\\apppatch\\svchost.exe" 45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe 4928 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3944 45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3944 45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe Token: SeSecurityPrivilege 3944 45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe Token: SeSecurityPrivilege 4928 svchost.exe Token: SeSecurityPrivilege 4928 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3944 wrote to memory of 4928 3944 45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe 83 PID 3944 wrote to memory of 4928 3944 45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe 83 PID 3944 wrote to memory of 4928 3944 45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\45c31bef2b57559db7f4234e644fd700_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
206KB
MD50e62fe7ce2ca3bcfe65ec051bdb2ba11
SHA1bc0ebbcdb5d0b7adcee18f5f8ce4d5bef0cdd775
SHA256e6ea20a5c05287707a151e4f017b00a6fb639cddd8e9802cc6aa40e994bc9400
SHA512633fce6b068d6d3b5532bae3533fe4ce19da8c4532a681923e1542087be081416f8d2827f5cf277b66a92ecf94b5e3d7364f26c0df96bf4ab9221333956ec459