Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe
-
Size
538KB
-
MD5
c489ee28d359d41a2f8dca18e4c9b1a0
-
SHA1
923609678a30d4be415cfb98e6533b98aafb85da
-
SHA256
1a16a12c33ffe40a51ebb6add9ccfc7396c06a5419b42dfb3cf0131c4409b4f2
-
SHA512
3b522335365ddc9fd3e80fa4951c431c5e72597f6ccb047c8cc851d100574150405936d8576eb655a39a6c7a679d5d77085a87132f8a829fa8211bb593ef97fa
-
SSDEEP
12288:wlbC+h1gL5pRTcAkS/3hzN8qE43fm78VS:WbC+w5jcAkSYqyES
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1932 MSWDM.EXE 1840 MSWDM.EXE 2524 C489EE28D359D41A2F8DCA18E4C9B1A0_NEIKIANALYTICS.EXE 2504 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 1932 MSWDM.EXE 2668 Process not Found -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe File opened for modification C:\Windows\devD69.tmp c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe File opened for modification C:\Windows\devD69.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1932 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1840 1956 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 28 PID 1956 wrote to memory of 1840 1956 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 28 PID 1956 wrote to memory of 1840 1956 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 28 PID 1956 wrote to memory of 1840 1956 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 28 PID 1956 wrote to memory of 1932 1956 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 29 PID 1956 wrote to memory of 1932 1956 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 29 PID 1956 wrote to memory of 1932 1956 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 29 PID 1956 wrote to memory of 1932 1956 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 29 PID 1932 wrote to memory of 2524 1932 MSWDM.EXE 30 PID 1932 wrote to memory of 2524 1932 MSWDM.EXE 30 PID 1932 wrote to memory of 2524 1932 MSWDM.EXE 30 PID 1932 wrote to memory of 2524 1932 MSWDM.EXE 30 PID 1932 wrote to memory of 2504 1932 MSWDM.EXE 32 PID 1932 wrote to memory of 2504 1932 MSWDM.EXE 32 PID 1932 wrote to memory of 2504 1932 MSWDM.EXE 32 PID 1932 wrote to memory of 2504 1932 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1840
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devD69.tmp!C:\Users\Admin\AppData\Local\Temp\c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\C489EE28D359D41A2F8DCA18E4C9B1A0_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2524
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devD69.tmp!C:\Users\Admin\AppData\Local\Temp\C489EE28D359D41A2F8DCA18E4C9B1A0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD5d6ed4be14a07bce9772d7ed944366f7b
SHA15702cdb3afe5b13db25d24f45862dc42d91acde4
SHA256020b01e00b9cf041dc7f2a476b6ed0f64f40e727e7e019beb3abe1ddcbddd878
SHA5120216e1878865d45cd0b05edff841ddaa69e193ff469c9e9c904011b20995c154b53ca357a190b594fb18feb1692a0bebddaf002ace6896bfad46023d848768a2
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
80KB
MD5dd68dc1f2acb8d56535514be222da2e9
SHA1f8b48112bb5bff4d77e705ce05aa0f2dcb80c904
SHA25638137371838a2b2704b823ed0fb8d6bb1d9cca9fc7da334535942ab1d489eb09
SHA5122ebe2ea143735b014f5fced08a95a3e64a6c54a293a818a0d39555a31ea8d940b28ce9a6937f3d4d6cd449b849d5a1e8a645603c2571260bd6996bdb050bcb8a