Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 12:30

General

  • Target

    0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe

  • Size

    76KB

  • MD5

    0ce0e69ccb9b5c1e856e831c4a663100

  • SHA1

    c3fdc562b16baae8f0538668cbe3c493ad5e6715

  • SHA256

    ac970a41db8598dbd7db4b2879dc6185f736ff894fa02ca0d957ff6b0ae414e6

  • SHA512

    08e055da9ff90848b52d8d5eda184c41e12bdfedae7e6f8bbd67e5f87fbd32befe0deb2d431ddc342d606ae3953f9265b39d81bb26ce40d14dd6d01e004ca904

  • SSDEEP

    1536:MvP69lUyW1UwzJmWRaD1gXI7uMrpzrnacxfzZ1:G69lU2UmWVXI7uMlzTFz7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FEPML.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\system\svchost.exe" /f
          4⤵
          • Adds Run key to start application
          PID:4968
      • C:\Users\Admin\AppData\Roaming\system\svchost.exe
        "C:\Users\Admin\AppData\Roaming\system\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Users\Admin\AppData\Roaming\system\svchost.exe
          "C:\Users\Admin\AppData\Roaming\system\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1036
        • C:\Users\Admin\AppData\Roaming\system\svchost.exe
          "C:\Users\Admin\AppData\Roaming\system\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2316
          • C:\Users\Admin\AppData\Roaming\system\svchost.exe
            "C:\Users\Admin\AppData\Roaming\system\svchost.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\cxz.exe

    Filesize

    294B

    MD5

    770692f6288b13724c0e2b3ed2ee3e03

    SHA1

    68f912fcc1da8dc7c421b577bdc5a811ed8a9c74

    SHA256

    0b7e03348c40bb8e125ccd632e1cc2126c5f7644af587b5c5c270eb310a53fb5

    SHA512

    538eec5d6636aab345722acafa85bd48e270bc0270369b3d527cbea33889208564f5070e5824fdbdd0927390ed1314ae387487cd5dfdb433b4543750fa8c91b2

  • C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe

    Filesize

    76KB

    MD5

    0ce0e69ccb9b5c1e856e831c4a663100

    SHA1

    c3fdc562b16baae8f0538668cbe3c493ad5e6715

    SHA256

    ac970a41db8598dbd7db4b2879dc6185f736ff894fa02ca0d957ff6b0ae414e6

    SHA512

    08e055da9ff90848b52d8d5eda184c41e12bdfedae7e6f8bbd67e5f87fbd32befe0deb2d431ddc342d606ae3953f9265b39d81bb26ce40d14dd6d01e004ca904

  • C:\Users\Admin\AppData\Local\Temp\FEPML.txt

    Filesize

    148B

    MD5

    05d958f804a3cb770b18371699915faf

    SHA1

    82e91a19f4f23340db8bb5c7d271aa0b590ff723

    SHA256

    61ae6f17d637624fd66d1dfad93a1c6a863aa7caf67d3e267910f4b9212bdf52

    SHA512

    3ff7be267167f2c447e9aeef2f5e84785dd45d08a10738b1b4c1b01b21d3ea29e637ede50b1091211b97fd40ae5b2bea54e053200778228ffde852f8a19ce921

  • C:\Users\Admin\AppData\Roaming\system\svchost.exe

    Filesize

    76KB

    MD5

    83d913b0a8cce4e131584e1bd9146fed

    SHA1

    2a9a769ba22334cba914b44a84dedc03eae891e4

    SHA256

    995ce7b3ab24715bf5953ab45dd5673c99cae85881ec5f87a95dde4ff6a18baa

    SHA512

    8f7220d175f8a9e98ef14ebcc9b8e6fc57f6122402a4c2da9d64db55dabe4dddc8e2b0973ea13463f132a916636eb2db474ff85f664f0c25a712445d46930bf6

  • memory/1036-87-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1036-54-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1912-85-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1912-63-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1912-58-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/2316-60-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2316-49-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2316-46-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2316-53-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2624-8-0x0000000002280000-0x0000000002281000-memory.dmp

    Filesize

    4KB

  • memory/2624-4-0x0000000002240000-0x0000000002241000-memory.dmp

    Filesize

    4KB

  • memory/2624-5-0x0000000002270000-0x0000000002271000-memory.dmp

    Filesize

    4KB

  • memory/2624-2-0x0000000002220000-0x0000000002221000-memory.dmp

    Filesize

    4KB

  • memory/2624-3-0x0000000002230000-0x0000000002231000-memory.dmp

    Filesize

    4KB

  • memory/3048-39-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3048-45-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3048-38-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3248-37-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3248-57-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3248-11-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3248-10-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3248-6-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB