Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe
-
Size
538KB
-
MD5
c489ee28d359d41a2f8dca18e4c9b1a0
-
SHA1
923609678a30d4be415cfb98e6533b98aafb85da
-
SHA256
1a16a12c33ffe40a51ebb6add9ccfc7396c06a5419b42dfb3cf0131c4409b4f2
-
SHA512
3b522335365ddc9fd3e80fa4951c431c5e72597f6ccb047c8cc851d100574150405936d8576eb655a39a6c7a679d5d77085a87132f8a829fa8211bb593ef97fa
-
SSDEEP
12288:wlbC+h1gL5pRTcAkS/3hzN8qE43fm78VS:WbC+w5jcAkSYqyES
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4060 MSWDM.EXE 1168 MSWDM.EXE 3156 C489EE28D359D41A2F8DCA18E4C9B1A0_NEIKIANALYTICS.EXE 1728 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe File opened for modification C:\Windows\dev2E53.tmp c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe File opened for modification C:\Windows\dev2E53.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 MSWDM.EXE 1168 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 936 wrote to memory of 4060 936 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 83 PID 936 wrote to memory of 4060 936 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 83 PID 936 wrote to memory of 4060 936 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 83 PID 936 wrote to memory of 1168 936 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 84 PID 936 wrote to memory of 1168 936 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 84 PID 936 wrote to memory of 1168 936 c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe 84 PID 1168 wrote to memory of 3156 1168 MSWDM.EXE 85 PID 1168 wrote to memory of 3156 1168 MSWDM.EXE 85 PID 1168 wrote to memory of 1728 1168 MSWDM.EXE 87 PID 1168 wrote to memory of 1728 1168 MSWDM.EXE 87 PID 1168 wrote to memory of 1728 1168 MSWDM.EXE 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:936 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4060
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev2E53.tmp!C:\Users\Admin\AppData\Local\Temp\c489ee28d359d41a2f8dca18e4c9b1a0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\C489EE28D359D41A2F8DCA18E4C9B1A0_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:3156
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev2E53.tmp!C:\Users\Admin\AppData\Local\Temp\C489EE28D359D41A2F8DCA18E4C9B1A0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD59b6bb58cfa3f0e91ffd06acc068ecbe1
SHA1878227384b844b27941bf02dc80ce2d09d4d7338
SHA256c53daf1a1b1e636557db5c406904eddcb09a79bafa44dc5c7acceec57318a544
SHA512e7a91c84a2859559da36f0cbaedda6b48c21d60db71559ac9a986f50e7e78a5ddd075d51d732747fdcea21099c98642941c38c9ea1f824915af2595fa2048815
-
Filesize
80KB
MD5dd68dc1f2acb8d56535514be222da2e9
SHA1f8b48112bb5bff4d77e705ce05aa0f2dcb80c904
SHA25638137371838a2b2704b823ed0fb8d6bb1d9cca9fc7da334535942ab1d489eb09
SHA5122ebe2ea143735b014f5fced08a95a3e64a6c54a293a818a0d39555a31ea8d940b28ce9a6937f3d4d6cd449b849d5a1e8a645603c2571260bd6996bdb050bcb8a
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628