Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe
-
Size
114KB
-
MD5
d01941c76c15122c1da56ea88bc3fba0
-
SHA1
faf82a02e1536d4d11f183f344208b0ee39d5178
-
SHA256
bdd4c71987f7e0d8bdd4d4e8ec91ed729b280dfda65e653eb0d4bb4dccbb8b2f
-
SHA512
4153d0d2b5b837a543bab2098d2abf5d283f1e89ccedb31c79252f89b183b61c06b0456b796f253218cddc7d7128efdfc3ad76d6bf04ff5d1db5b2f06140d277
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDj:P5eznsjsguGDFqGZ2rDj
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 4532 chargeable.exe 4996 chargeable.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe" d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4532 set thread context of 4996 4532 chargeable.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4444 4996 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4532 4704 d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe 87 PID 4704 wrote to memory of 4532 4704 d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe 87 PID 4704 wrote to memory of 4532 4704 d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe 87 PID 4532 wrote to memory of 4996 4532 chargeable.exe 88 PID 4532 wrote to memory of 4996 4532 chargeable.exe 88 PID 4532 wrote to memory of 4996 4532 chargeable.exe 88 PID 4532 wrote to memory of 4996 4532 chargeable.exe 88 PID 4532 wrote to memory of 4996 4532 chargeable.exe 88 PID 4532 wrote to memory of 4996 4532 chargeable.exe 88 PID 4532 wrote to memory of 4996 4532 chargeable.exe 88 PID 4532 wrote to memory of 4996 4532 chargeable.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d01941c76c15122c1da56ea88bc3fba0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1524⤵
- Program crash
PID:4444
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4996 -ip 49961⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD519b88f43c4bb0edcdb697bf1d311c17d
SHA162eaef923d06d808da46f7f2f49306a9e917515e
SHA2561eaedfd9d2f7e37df46b5dedc828d24b4591640bd286e91777fd66b95120ef37
SHA51292f7f08431b6ef9376ae5671538e659ec4f4108af85084095907f3683647d696903ca5f07f36ecf359b7a59010f60359b83704b7ccecaca791164b62185cb93a