Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe
-
Size
538KB
-
MD5
111dc7c00c7a8df8159d6e0f95c4c190
-
SHA1
38fe5530886375e0b33f978199849eeb68bfe4a9
-
SHA256
6d7dfb457e2569ad67b51b416dae8bcedef012c8ef96977bc3e7f2e502e91985
-
SHA512
ed1395b2a2507c9cfca6bef496fa94b67e61c325682e2fadb3bb4613de8512eb035e4cc8012ca8a0970093bf616c03dfb57ea204da7f4ea2eb3c210930060be5
-
SSDEEP
12288:wlbU+h1gL5pRTcAkS/3hzN8qE43fm78Vk:WbU+w5jcAkSYqyEk
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4760 MSWDM.EXE 1868 MSWDM.EXE 2696 111DC7C00C7A8DF8159D6E0F95C4C190_NEIKIANALYTICS.EXE 2964 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe File opened for modification C:\Windows\dev88.tmp 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe File opened for modification C:\Windows\dev88.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1868 MSWDM.EXE 1868 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4760 5088 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 92 PID 5088 wrote to memory of 4760 5088 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 92 PID 5088 wrote to memory of 4760 5088 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 92 PID 5088 wrote to memory of 1868 5088 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 93 PID 5088 wrote to memory of 1868 5088 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 93 PID 5088 wrote to memory of 1868 5088 111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe 93 PID 1868 wrote to memory of 2696 1868 MSWDM.EXE 94 PID 1868 wrote to memory of 2696 1868 MSWDM.EXE 94 PID 1868 wrote to memory of 2964 1868 MSWDM.EXE 96 PID 1868 wrote to memory of 2964 1868 MSWDM.EXE 96 PID 1868 wrote to memory of 2964 1868 MSWDM.EXE 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4760
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev88.tmp!C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\111DC7C00C7A8DF8159D6E0F95C4C190_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2696
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev88.tmp!C:\Users\Admin\AppData\Local\Temp\111DC7C00C7A8DF8159D6E0F95C4C190_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2964
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3740 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD504e1acac5947d5ca3e3eb0ab2ad980b8
SHA1b49459959b6dd8a922c0f783599a1c6082c347dd
SHA256b8de3fc592ed2ea1f6b4fc1cbee247b4c4688b8ed237f430f14e6a9fa29025ba
SHA512d11fa245ce000e14b09c1e77bd9fc20f1a90cc8629aabd46a0c49b9dcf20252e65b1399f2dbdab2755fc64ffb54d8faf6f6452fae16cf88f3ed4ee4057b886b9
-
Filesize
80KB
MD53bad16e6b9791239f0136f664c22ace8
SHA1a92f82890a3ac797b3e5d51840be75376e751a0f
SHA2566b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17
SHA512ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628