Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe
-
Size
482KB
-
MD5
d451b6e07aabf666e575cadab24884e0
-
SHA1
fe90e1fa7d3d7ed12204df462bce622f13d1cb28
-
SHA256
8a53e642970e248795afacebbe81e4b7c3a3944543ca224a5d8bede2d52cca96
-
SHA512
ee008176725121ba30f207fe4567ec97edf4943900038bca92f11170d41da10ca46719416c61ef2ef8e573cb54e67ba68ad93ae63335383d2dbc2d108bfd71cb
-
SSDEEP
12288:vWpijK/sQTpTRDC5Kcv3/ZJEvWsACQ8zUfFv:vWpijK7pQ5XQhDzQv
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\trkcore = "C:\\ProgramData\\Microsoft\\Roaming\\svchost.exe" d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 13 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2872 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2976 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2976 2872 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2976 2872 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2976 2872 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2976 2872 d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\d451b6e07aabf666e575cadab24884e0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- System policy modification
PID:2976
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2744
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
482KB
MD5e388e16da6e418d07bd87278769d6d80
SHA1f7065a62fc716d7b05a72b9ec881d08931196e05
SHA2569bf5d4ea0cf08c6575dafc2c86c878e1e0ff62745e79c7c34f4c3f8236475912
SHA51293063969cff8778a5c9fc1c82f51fd9c4d971d6cb67de3228fc65867bee3bf577656bbf9ac586928977b2f7c420542321f966ed61cbaae017ed4f7d261c6c051