Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    33s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 02:38

General

  • Target

    5dbf7a3d105b704002ee3c7720ab54c0_NeikiAnalytics.exe

  • Size

    132KB

  • MD5

    5dbf7a3d105b704002ee3c7720ab54c0

  • SHA1

    3f2fe8a0ad29694fa5b41feb8282da6d73776d1a

  • SHA256

    17a1f0990f681b8d5ed75a146915419cc749388f0210f18ea60391a1745c4bd6

  • SHA512

    a57c7135f2dddb0ac28e8f0c8032d71e27c3aa73f7a34ae80ea9612360ddfcc86d03fa486575a73694ca9eccee154b2f134dd291acfdde75a508290b2967d178

  • SSDEEP

    1536:7FAKp6qj6E09L6KWHheM8uFNzAhH02jpX00cPG306sgXtlO3mnXQ3:7Hp6s6E08XBEEND2x0Q06sgO2A3

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dbf7a3d105b704002ee3c7720ab54c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5dbf7a3d105b704002ee3c7720ab54c0_NeikiAnalytics.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\puoalos.exe
      "C:\Users\Admin\puoalos.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\puoalos.exe

    Filesize

    132KB

    MD5

    e954af1758675eccd34a5b786e63be17

    SHA1

    a035b2d9131248364b20dc3ca4e8c97952b5994f

    SHA256

    3d273596c7db68293191662e138d8b8f10afea5a2ed9f1b34bcda90fcb26f930

    SHA512

    c5cab67952251c5677907b6c462e70e31f1d779299f63df5773bcf513cdc86bf9f46176f2cfe414a3b3ac78f63b663383dd7618a7b46a2b8c20a7ed7a1d80110