Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe
-
Size
66KB
-
MD5
18201ab8fea5b6355f397e0f735fa830
-
SHA1
048e248dcfbec2ad904917b9b55fe1376b09de8b
-
SHA256
3c4e278e34855819d71854f04f4141075bb706d2592d979d3393f81bd5c5244d
-
SHA512
b3438579f16b6e57e1704dbb117aec0a91cdd9e4c1eda7feda4be2f47896009fa4b465f56cfdb897f188106923fb826c5a429ab356984872f6a75bea39f38b24
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXih:IeklMMYJhqezw/pXzH9ih
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/1688-36-0x00000000753E0000-0x000000007553D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2992 explorer.exe 1464 spoolsv.exe 1688 svchost.exe 1972 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2872 18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe 2872 18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe 2992 explorer.exe 2992 explorer.exe 2992 explorer.exe 2992 explorer.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe 2992 explorer.exe 2992 explorer.exe 1688 svchost.exe 1688 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2992 explorer.exe 1688 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2872 18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe 2872 18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe 2992 explorer.exe 2992 explorer.exe 1464 spoolsv.exe 1464 spoolsv.exe 1688 svchost.exe 1688 svchost.exe 1972 spoolsv.exe 1972 spoolsv.exe 2992 explorer.exe 2992 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2992 2872 18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe 82 PID 2872 wrote to memory of 2992 2872 18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe 82 PID 2872 wrote to memory of 2992 2872 18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe 82 PID 2992 wrote to memory of 1464 2992 explorer.exe 83 PID 2992 wrote to memory of 1464 2992 explorer.exe 83 PID 2992 wrote to memory of 1464 2992 explorer.exe 83 PID 1464 wrote to memory of 1688 1464 spoolsv.exe 85 PID 1464 wrote to memory of 1688 1464 spoolsv.exe 85 PID 1464 wrote to memory of 1688 1464 spoolsv.exe 85 PID 1688 wrote to memory of 1972 1688 svchost.exe 86 PID 1688 wrote to memory of 1972 1688 svchost.exe 86 PID 1688 wrote to memory of 1972 1688 svchost.exe 86 PID 1688 wrote to memory of 1808 1688 svchost.exe 87 PID 1688 wrote to memory of 1808 1688 svchost.exe 87 PID 1688 wrote to memory of 1808 1688 svchost.exe 87 PID 1688 wrote to memory of 3828 1688 svchost.exe 97 PID 1688 wrote to memory of 3828 1688 svchost.exe 97 PID 1688 wrote to memory of 3828 1688 svchost.exe 97 PID 1688 wrote to memory of 1444 1688 svchost.exe 99 PID 1688 wrote to memory of 1444 1688 svchost.exe 99 PID 1688 wrote to memory of 1444 1688 svchost.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\18201ab8fea5b6355f397e0f735fa830_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Windows\SysWOW64\at.exeat 16:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1808
-
-
C:\Windows\SysWOW64\at.exeat 16:07 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3828
-
-
C:\Windows\SysWOW64\at.exeat 16:08 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1444
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD591106c9193b71cb550232844e7ac12f5
SHA1dbb7f7220f8fffa56b58f7e7400ee501e5cd978f
SHA2561bc4e4137e4d873ef0ed9f11b02133b054c3825746744ac28ac4d2fae452caba
SHA512cd7aca6f02d9f2b31fd522e86fcb7a773b0552d5b3564074bff357efb1f909875a18c6c68e9f925daebffc72cadfc7ee6ea7773b83ba9ec9529803cef5b2af07
-
Filesize
66KB
MD567977badeb47c28f6c3b41c698a58f45
SHA17ba5a97f1904780fbf7dae416fee933ad143c7de
SHA256f24cb0d4554a82861112598c7de94400596eb8ee8cc50b91f6f20cfecfdab4a2
SHA512708b1662ca512a11ecfad5721f9559e39ff87f146606fd24a96c82a6f623042586f9f77876e794bd3c551999dbcc666b3abe72293428b58c5ea1db8706ddaa5c
-
Filesize
66KB
MD5fd6b0ede4876a8f9127dcfbcc3b6920b
SHA1e943fe5e78cac4da53e06fabda3f06f84a8f7527
SHA2563b7a6cc668fbcce660155224322777fc045b2190611ddd15e438674b284d37b9
SHA5121d5692a24150a3d251b1624d0b3c051fecdeffb906bfcd9dced06e95463e28f30c1e830ab96884a8cb4031c751999f678f97706e20e45282bb22092918c3a964
-
Filesize
66KB
MD50b8279ab7ec617734f4b463ca65d9c1d
SHA1e3e5f9a167b8c4f4cbb0430aec457908d100c409
SHA25611cfbaf809cda76ee1d78e1c5b37656190a8e0b52f569925210920f222865366
SHA5128b37b2c5dbe7928b26e927a98d8a1882ef16949aadded09d25c34a45198b73100838eda7f0fed1930f439903bf2a28e21d13aaa712674f6265dcdeea1ce3cad1