Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe
-
Size
76KB
-
MD5
0ce0e69ccb9b5c1e856e831c4a663100
-
SHA1
c3fdc562b16baae8f0538668cbe3c493ad5e6715
-
SHA256
ac970a41db8598dbd7db4b2879dc6185f736ff894fa02ca0d957ff6b0ae414e6
-
SHA512
08e055da9ff90848b52d8d5eda184c41e12bdfedae7e6f8bbd67e5f87fbd32befe0deb2d431ddc342d606ae3953f9265b39d81bb26ce40d14dd6d01e004ca904
-
SSDEEP
1536:MvP69lUyW1UwzJmWRaD1gXI7uMrpzrnacxfzZ1:G69lU2UmWVXI7uMlzTFz7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 5 IoCs
pid Process 3248 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 3048 svchost.exe 1036 svchost.exe 2316 svchost.exe 1912 svchost.exe -
resource yara_rule behavioral2/memory/3248-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2624-8-0x0000000002280000-0x0000000002281000-memory.dmp upx behavioral2/memory/3248-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3248-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3248-37-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1036-54-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3248-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1036-87-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\system\\svchost.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2624 set thread context of 3248 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 95 PID 3048 set thread context of 1036 3048 svchost.exe 103 PID 3048 set thread context of 2316 3048 svchost.exe 104 PID 2316 set thread context of 1912 2316 svchost.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe Token: SeDebugPrivilege 1036 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 3248 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 3048 svchost.exe 1036 svchost.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3248 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 95 PID 2624 wrote to memory of 3248 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 95 PID 2624 wrote to memory of 3248 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 95 PID 2624 wrote to memory of 3248 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 95 PID 2624 wrote to memory of 3248 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 95 PID 2624 wrote to memory of 3248 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 95 PID 2624 wrote to memory of 3248 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 95 PID 2624 wrote to memory of 3248 2624 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 95 PID 3248 wrote to memory of 4816 3248 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 98 PID 3248 wrote to memory of 4816 3248 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 98 PID 3248 wrote to memory of 4816 3248 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 98 PID 4816 wrote to memory of 4968 4816 cmd.exe 101 PID 4816 wrote to memory of 4968 4816 cmd.exe 101 PID 4816 wrote to memory of 4968 4816 cmd.exe 101 PID 3248 wrote to memory of 3048 3248 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 102 PID 3248 wrote to memory of 3048 3248 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 102 PID 3248 wrote to memory of 3048 3248 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 102 PID 3048 wrote to memory of 1036 3048 svchost.exe 103 PID 3048 wrote to memory of 1036 3048 svchost.exe 103 PID 3048 wrote to memory of 1036 3048 svchost.exe 103 PID 3048 wrote to memory of 1036 3048 svchost.exe 103 PID 3048 wrote to memory of 1036 3048 svchost.exe 103 PID 3048 wrote to memory of 1036 3048 svchost.exe 103 PID 3048 wrote to memory of 1036 3048 svchost.exe 103 PID 3048 wrote to memory of 1036 3048 svchost.exe 103 PID 3048 wrote to memory of 2316 3048 svchost.exe 104 PID 3048 wrote to memory of 2316 3048 svchost.exe 104 PID 3048 wrote to memory of 2316 3048 svchost.exe 104 PID 3048 wrote to memory of 2316 3048 svchost.exe 104 PID 3048 wrote to memory of 2316 3048 svchost.exe 104 PID 3048 wrote to memory of 2316 3048 svchost.exe 104 PID 3048 wrote to memory of 2316 3048 svchost.exe 104 PID 2316 wrote to memory of 1912 2316 svchost.exe 105 PID 2316 wrote to memory of 1912 2316 svchost.exe 105 PID 2316 wrote to memory of 1912 2316 svchost.exe 105 PID 2316 wrote to memory of 1912 2316 svchost.exe 105 PID 2316 wrote to memory of 1912 2316 svchost.exe 105 PID 2316 wrote to memory of 1912 2316 svchost.exe 105 PID 2316 wrote to memory of 1912 2316 svchost.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FEPML.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\system\svchost.exe" /f4⤵
- Adds Run key to start application
PID:4968
-
-
-
C:\Users\Admin\AppData\Roaming\system\svchost.exe"C:\Users\Admin\AppData\Roaming\system\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\system\svchost.exe"C:\Users\Admin\AppData\Roaming\system\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Users\Admin\AppData\Roaming\system\svchost.exe"C:\Users\Admin\AppData\Roaming\system\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\system\svchost.exe"C:\Users\Admin\AppData\Roaming\system\svchost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1912
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD5770692f6288b13724c0e2b3ed2ee3e03
SHA168f912fcc1da8dc7c421b577bdc5a811ed8a9c74
SHA2560b7e03348c40bb8e125ccd632e1cc2126c5f7644af587b5c5c270eb310a53fb5
SHA512538eec5d6636aab345722acafa85bd48e270bc0270369b3d527cbea33889208564f5070e5824fdbdd0927390ed1314ae387487cd5dfdb433b4543750fa8c91b2
-
Filesize
76KB
MD50ce0e69ccb9b5c1e856e831c4a663100
SHA1c3fdc562b16baae8f0538668cbe3c493ad5e6715
SHA256ac970a41db8598dbd7db4b2879dc6185f736ff894fa02ca0d957ff6b0ae414e6
SHA51208e055da9ff90848b52d8d5eda184c41e12bdfedae7e6f8bbd67e5f87fbd32befe0deb2d431ddc342d606ae3953f9265b39d81bb26ce40d14dd6d01e004ca904
-
Filesize
148B
MD505d958f804a3cb770b18371699915faf
SHA182e91a19f4f23340db8bb5c7d271aa0b590ff723
SHA25661ae6f17d637624fd66d1dfad93a1c6a863aa7caf67d3e267910f4b9212bdf52
SHA5123ff7be267167f2c447e9aeef2f5e84785dd45d08a10738b1b4c1b01b21d3ea29e637ede50b1091211b97fd40ae5b2bea54e053200778228ffde852f8a19ce921
-
Filesize
76KB
MD583d913b0a8cce4e131584e1bd9146fed
SHA12a9a769ba22334cba914b44a84dedc03eae891e4
SHA256995ce7b3ab24715bf5953ab45dd5673c99cae85881ec5f87a95dde4ff6a18baa
SHA5128f7220d175f8a9e98ef14ebcc9b8e6fc57f6122402a4c2da9d64db55dabe4dddc8e2b0973ea13463f132a916636eb2db474ff85f664f0c25a712445d46930bf6