Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe
-
Size
211KB
-
MD5
208cc46a095afe8c984556cec3097ec0
-
SHA1
91d38e6348fabd7c1c901f9c871f1a94a4cdb1c4
-
SHA256
dc744862f33f7a231e99f67613748cf475337ab8cbc8a7b6cc02ce14c27e01a1
-
SHA512
c00287d33a39fc7ead37c3672fbd05943db37ac189b9eeaf39c35a1e701d9f9058559796ba098077a48b62eff396adbe869bb53ce471c233ced4d145ae8d246e
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOi:Jh8cBzHLRMpZ4d1Zi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe -
Executes dropped EXE 4 IoCs
pid Process 2588 userinit.exe 5080 spoolsw.exe 1988 swchost.exe 2616 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\userinit.exe 208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1056 208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe 1056 208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe 2588 userinit.exe 2588 userinit.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 2588 userinit.exe 1988 swchost.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 2588 userinit.exe 2588 userinit.exe 1988 swchost.exe 1988 swchost.exe 1988 swchost.exe 2588 userinit.exe 2588 userinit.exe 1988 swchost.exe 1988 swchost.exe 2588 userinit.exe 2588 userinit.exe 1988 swchost.exe 1988 swchost.exe 1988 swchost.exe 2588 userinit.exe 2588 userinit.exe 2588 userinit.exe 2588 userinit.exe 1988 swchost.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe 2588 userinit.exe 1988 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1988 swchost.exe 2588 userinit.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1056 208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe 1056 208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe 2588 userinit.exe 2588 userinit.exe 5080 spoolsw.exe 5080 spoolsw.exe 1988 swchost.exe 1988 swchost.exe 2616 spoolsw.exe 2616 spoolsw.exe 2588 userinit.exe 2588 userinit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2588 1056 208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe 85 PID 1056 wrote to memory of 2588 1056 208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe 85 PID 1056 wrote to memory of 2588 1056 208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe 85 PID 2588 wrote to memory of 5080 2588 userinit.exe 86 PID 2588 wrote to memory of 5080 2588 userinit.exe 86 PID 2588 wrote to memory of 5080 2588 userinit.exe 86 PID 5080 wrote to memory of 1988 5080 spoolsw.exe 87 PID 5080 wrote to memory of 1988 5080 spoolsw.exe 87 PID 5080 wrote to memory of 1988 5080 spoolsw.exe 87 PID 1988 wrote to memory of 2616 1988 swchost.exe 88 PID 1988 wrote to memory of 2616 1988 swchost.exe 88 PID 1988 wrote to memory of 2616 1988 swchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\208cc46a095afe8c984556cec3097ec0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD54afd41e13b35971aeb8e1df956e3e5f6
SHA155b4356631eb3726ff5152bfb94ef04792136c0c
SHA256bcb2d04b5b238a96812eba9d8fedc6ddb02bfe9af0a1c88fa2421fac6ce4fa92
SHA5122972b6460290b42474b23aaacaf03c0404f126c14df74edc6ae18da092efa6d61546c3996b513d1eeba79fe2ed173c9c4c5d7c3253050b4a1ddd391f7a49c361
-
Filesize
211KB
MD55ac8d236855689e5cbfac27d112b2aa0
SHA167db58943eff773598593bbb788f10b0d706a727
SHA256f79aa1fd108b07d198eb4d72da4a392d5b575a86c29e2ecb5e23144fdad0176b
SHA51237f1599d94c25b72f5eb0b53fe3bc4fc64fa28c309a6503970fef4fbc4238e6aec5bb0611d112c5ca4430f092a5c521268101432afac0d08c0a25a1c18cf73f9
-
Filesize
211KB
MD5f95011a52f5a5c2ac1a855cbf6a79f43
SHA1cc42eef5ea7bbcca63556130f7f99c1a5b4c8e40
SHA2566c3a2dbbe8673bf7e48a1433c77ec6052474125e5c7694bcaa0bb6fd6c770013
SHA5123de2f3895c409da6288aebaa0385e77c97bfcf8e4fd0b1b53c0f9c64b100b5f63c64689ed58015a103b79537757d8272bdbdb4db539dce4fa075d9e1461463c6
-
Filesize
211KB
MD554889cea02cbf6e572f2c848bbdcf442
SHA1f2a8e5bda3c2c7d3bcd93ceb50b8e00bca440c29
SHA2569194fbfb47ee3176559e97f691dc7da35f440e9996bac44649dc0554291200f6
SHA5126937600ce93bb1e9e71bfa4b714308c0b944c99d3f22ab2459baff1cae6f0b107baa8513199da5af07591fef33eb5cb1a21df22a5510d377f915506f00a93cb6