Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe
-
Size
538KB
-
MD5
111dc7c00c7a8df8159d6e0f95c4c190
-
SHA1
38fe5530886375e0b33f978199849eeb68bfe4a9
-
SHA256
6d7dfb457e2569ad67b51b416dae8bcedef012c8ef96977bc3e7f2e502e91985
-
SHA512
ed1395b2a2507c9cfca6bef496fa94b67e61c325682e2fadb3bb4613de8512eb035e4cc8012ca8a0970093bf616c03dfb57ea204da7f4ea2eb3c210930060be5
-
SSDEEP
12288:wlbU+h1gL5pRTcAkS/3hzN8qE43fm78Vk:WbU+w5jcAkSYqyEk
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2892 MSWDM.EXE 2488 MSWDM.EXE 3064 111DC7C00C7A8DF8159D6E0F95C4C190_NEIKIANALYTICS.EXE 2780 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2892 MSWDM.EXE 2740 Process not Found -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\dev1536.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe File opened for modification C:\Windows\dev1536.tmp 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2892 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2488 1716 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 28 PID 1716 wrote to memory of 2488 1716 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 28 PID 1716 wrote to memory of 2488 1716 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 28 PID 1716 wrote to memory of 2488 1716 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 28 PID 1716 wrote to memory of 2892 1716 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 29 PID 1716 wrote to memory of 2892 1716 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 29 PID 1716 wrote to memory of 2892 1716 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 29 PID 1716 wrote to memory of 2892 1716 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 29 PID 2892 wrote to memory of 3064 2892 MSWDM.EXE 30 PID 2892 wrote to memory of 3064 2892 MSWDM.EXE 30 PID 2892 wrote to memory of 3064 2892 MSWDM.EXE 30 PID 2892 wrote to memory of 3064 2892 MSWDM.EXE 30 PID 2892 wrote to memory of 2780 2892 MSWDM.EXE 32 PID 2892 wrote to memory of 2780 2892 MSWDM.EXE 32 PID 2892 wrote to memory of 2780 2892 MSWDM.EXE 32 PID 2892 wrote to memory of 2780 2892 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2488
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev1536.tmp!C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\111DC7C00C7A8DF8159D6E0F95C4C190_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:3064
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev1536.tmp!C:\Users\Admin\AppData\Local\Temp\111DC7C00C7A8DF8159D6E0F95C4C190_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD56e1414b2637332c16697f3c4cc6a2520
SHA1c34cfb40cdc688080c83c32666d9126850d79b6d
SHA25683b7d8d6ff5873690d24c436c60fc6bd80f3fc843d9b9d18549bb99876095ebc
SHA512e204afde985ad9862acb544530e277563c4f1ce4491b7779073ab5b396442c0e0258b8b9045f8ddc135291a24bed8686d4dfb39c6e262851a28e46c23f0a6257
-
Filesize
80KB
MD53bad16e6b9791239f0136f664c22ace8
SHA1a92f82890a3ac797b3e5d51840be75376e751a0f
SHA2566b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17
SHA512ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628