Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe
-
Size
204KB
-
MD5
bac861d934b5d885462ea5191e42d340
-
SHA1
fa0b3ad150ef1626719871dbd1da848b62bf87b2
-
SHA256
892dd69ed001880490da4409a5d27617186d7074e981efa5e572dd57e4634f3b
-
SHA512
aac7e6712a147fe5d30710b599c0b8691f03b86fa635c41c982c1749dfe320c8be0a5977acc46783e8fb245fb63786486bc87dea190602ff3ec4e8cefba554db
-
SSDEEP
3072:KmkW8T0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWmI:FZU4QxL7B9W0c1RCzR/fSmlg
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tihow.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 tihow.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /q" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /f" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /y" bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /n" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /a" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /w" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /t" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /y" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /v" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /o" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /m" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /l" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /s" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /c" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /u" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /b" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /j" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /x" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /d" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /z" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /h" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /g" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /k" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /r" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /i" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /e" tihow.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4840 bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe 4840 bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe 4584 tihow.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4840 bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe 4584 tihow.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4840 wrote to memory of 4584 4840 bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe 90 PID 4840 wrote to memory of 4584 4840 bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe 90 PID 4840 wrote to memory of 4584 4840 bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\bac861d934b5d885462ea5191e42d340_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\tihow.exe"C:\Users\Admin\tihow.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD56e0b63b83831d23d952b82cfa6b24d0b
SHA18d6aefcbb92b1e1be22be63f8a8b201449581c4c
SHA25658e229d6b511be03221143c989a2cfcc6485f11a23955999258fb088971d0a3e
SHA5125e8182c6e713325492ec1e56d94b60df8b0e4a0d5c0414857a6a11017b3376ca26a58707337ec66d5f629abe4dc8fb18fa4b7771cb714603b9653480ad9f325c