Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 02:27
Behavioral task
behavioral1
Sample
591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe
-
Size
144KB
-
MD5
591b90fd1388ffe7883b3f085d88adf0
-
SHA1
58dc17b959a55fabcedda550ee9c7005c67d16d0
-
SHA256
ed0ec335128934b87d78da1d86e2a66d2abf66a58d3009759a9eb12d3dcbab7a
-
SHA512
10b1769fd143d1f186e1277bc7e986c93450e4a9ee53be899aedc5708419401ab56dab244773e55551e3905f3cbef00a030ef86cc60a1a395927d072d6da1c08
-
SSDEEP
3072:/27TcKbnTvCIDw0x+G3dF/Ytq7xIpNelJZyi4x6:oc+2mrL/v7xIpNiJHP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/2688-0-0x0000000000D70000-0x0000000000D97000-memory.dmp upx behavioral2/memory/2688-581-0x0000000000D70000-0x0000000000D97000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent0 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\bbc395f3.exe" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 4228 2688 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe 4228 svchost.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2688 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe 4228 svchost.exe 4228 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2688 wrote to memory of 4228 2688 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe 83 PID 2688 wrote to memory of 4228 2688 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe 83 PID 2688 wrote to memory of 4228 2688 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe 83 PID 2688 wrote to memory of 4228 2688 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe 83 PID 2688 wrote to memory of 4992 2688 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe 86 PID 2688 wrote to memory of 4992 2688 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe 86 PID 2688 wrote to memory of 4992 2688 591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\bbc395f3.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\pfq5380.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\591b90fd1388ffe7883b3f085d88adf0_NeikiAnalytics.exe""2⤵PID:4992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5e2057e237e9f41aff9c274c5b62dbddc
SHA1f0694e32e23c620a28d94087d6405cb2e182496f
SHA2566ca593670557cb5e07b0bd2f404234739d9c79215c4a82c6592834c481dbd0ee
SHA512e677d5d0b90fd02d48f2a0e2bfbf69270d80727b6371326f404a9bace5578376c396ac1622fa9c53d8cada6066a96614c21f9e88259082a6ef5ad94ed58fb5a8