Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe
-
Size
78KB
-
MD5
0908aa405072f2c3e8dbb55f4b684030
-
SHA1
f35e507803ff70397a6b4417ed6f69cc94b7372b
-
SHA256
5d84c8f6c095de440c126e97159013dd950c1fc8b045d53725b87e9e08b55010
-
SHA512
59b219a58e4b5aa09994a1e83be6f59ef8220908c3d8f2e33f0f314fa4d80ac00cc8fe29827028436fb01112ce83e60caad6c93857f87aeded6c2de050ac80b9
-
SSDEEP
1536:t58Vdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6i9/F143:t58An7N041Qqhg69/a
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 tmp3817.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp3817.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4520 0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe Token: SeDebugPrivilege 1724 tmp3817.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4520 wrote to memory of 892 4520 0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe 82 PID 4520 wrote to memory of 892 4520 0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe 82 PID 4520 wrote to memory of 892 4520 0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe 82 PID 892 wrote to memory of 3772 892 vbc.exe 86 PID 892 wrote to memory of 3772 892 vbc.exe 86 PID 892 wrote to memory of 3772 892 vbc.exe 86 PID 4520 wrote to memory of 1724 4520 0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe 88 PID 4520 wrote to memory of 1724 4520 0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe 88 PID 4520 wrote to memory of 1724 4520 0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\h3iu_svz.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3911.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4343B18F57174501BBAF8CBB403E6A22.TMP"3⤵PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp3817.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3817.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD544d523721a8722809b141e78595645ce
SHA1e9f3f22d805855005cab1093d405da4edd6754f7
SHA256c90868ad45a3caa31b5c80de5bac765488982c42122f57521fa03fc50399c274
SHA51291139ff613274582afe18b85c82f453feaf56a5efefc48ffa44731db7dc5bea9a2b963648e4a4cbf379ffa53a28ac771f8e8524ebf98ab197949d472e3f3f086
-
Filesize
14KB
MD56a6b5cf22e15e5234a99c069c13f70a0
SHA19cd6bd863035608f2162af84db2acfab38db5066
SHA25666630aa00d85e0dc464387d6b0c8541957b00b5d8f237dd3238e54c7470e1260
SHA51260cb1b24eed98ffead64f5ea5d7bc6eeb0b048884caf5124675699643308f8d587dc749bae24186754bb8d52c688b9eb2536ba23f779cbe1708df0c8f62261dc
-
Filesize
266B
MD512d2b69a5febf96f2f41147154d54c6d
SHA14cd18dc964a4af793ada793136d1acc7754098ce
SHA256c5853ff0eb6eccd01f7914bb247a5f1aceb8c51ce5905849317efe079dbfc3e4
SHA51299777e8f0b8e2c5af9da03fefb2512ce1d8e80311f267f09452c9fb70f29e6e3efb03e073e1883bb239f5af102a672c93568b139070dd0e8b2fb8ff5e0757319
-
Filesize
78KB
MD522632926ec27175e480b991222c02b44
SHA176956745abdf5e2c0e21ee57b77d1e1cbea9f91d
SHA256ee695180d4917f5c92af5a3d38896b559664b653800e786a90676e044d1a075b
SHA5123dc58e50b2c9310be79c3934753f697cd9fd6cc5c951802c64d4061a2da401d0335cdc21b80c730ec3b43e7cbf22fce127e56d65eabf965f3e572bf50a50daad
-
Filesize
660B
MD509db878f7cb0ea0f42bf506cfab02232
SHA138c5c7cabfbca0472bc05860d57c847617bcc252
SHA2567dc843254ed9a32984cc84bd8294cbe37c2c50961f01c7c133f0dfbe3d3e1312
SHA512518efb5c11680a841e34b9edf7be81fbb48fdfb4434816e8222038f7d5e26b118ac2ba7520ee8b8bc41ccf35314ef9fac4d7a9087c7bf584c93cb605cd4a0b70
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65