Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe
-
Size
40KB
-
MD5
d847213bf8f1b86d41d5a0d8d45f76c0
-
SHA1
9d8d4be75194fbfc2b0cdabe602c93e44fe2c068
-
SHA256
3c26d549cf4a1f19aa4c118cd89b214d398c977b0861f8aba7852b14e01ccec8
-
SHA512
03ec7fd498d90411529e834dde8281aac8e897f9ca5bc448f2ee9c6f794b94b558160ea58828ecb21f2ffd6740acb1f1384a8a98855e0ccdbc9632ab7077fe03
-
SSDEEP
768:1m/QojCpHfx0Zk6SLZRI+WE6F2UzpHjhm8f10+a3:EQoj85LLI+W5lju
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe -
Executes dropped EXE 3 IoCs
pid Process 2352 AE 0124 BE.exe 2552 winlogon.exe 2484 winlogon.exe -
Loads dropped DLL 4 IoCs
pid Process 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 2552 winlogon.exe 2552 winlogon.exe -
Drops autorun.inf file 1 TTPs 26 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\B:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\A:\Autorun.inf winlogon.exe File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe File opened for modification F:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\AE 0124 BE.exe d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe File opened for modification C:\Windows\AE 0124 BE.exe d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe File opened for modification C:\Windows\Msvbvm60.dll d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe File created C:\Windows\Msvbvm60.dll d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe File created C:\Windows\AE 0124 BE.exe winlogon.exe File opened for modification C:\Windows\Msvbvm60.dll winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 2552 winlogon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2352 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 28 PID 2796 wrote to memory of 2352 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 28 PID 2796 wrote to memory of 2352 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 28 PID 2796 wrote to memory of 2352 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 28 PID 2796 wrote to memory of 2552 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 29 PID 2796 wrote to memory of 2552 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 29 PID 2796 wrote to memory of 2552 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 29 PID 2796 wrote to memory of 2552 2796 d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe 29 PID 2552 wrote to memory of 2484 2552 winlogon.exe 30 PID 2552 wrote to memory of 2484 2552 winlogon.exe 30 PID 2552 wrote to memory of 2484 2552 winlogon.exe 30 PID 2552 wrote to memory of 2484 2552 winlogon.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d847213bf8f1b86d41d5a0d8d45f76c0_NeikiAnalytics.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Executes dropped EXE
PID:2484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5d847213bf8f1b86d41d5a0d8d45f76c0
SHA19d8d4be75194fbfc2b0cdabe602c93e44fe2c068
SHA2563c26d549cf4a1f19aa4c118cd89b214d398c977b0861f8aba7852b14e01ccec8
SHA51203ec7fd498d90411529e834dde8281aac8e897f9ca5bc448f2ee9c6f794b94b558160ea58828ecb21f2ffd6740acb1f1384a8a98855e0ccdbc9632ab7077fe03
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
40KB
MD5b88d41ea2279357efa9855cda64e71eb
SHA1329e0889d6770574a8654eebb0cfe935a1763db1
SHA256b76cf3532d9631e972838274b4261e459e64cb778af9f01c564a9a58f5d0dd66
SHA512f26e3a22ad5453bdafc10cbdd98873efad1a8a0fb7b9c06e1609a879f8b5708a596f87d87ccaf39ad5c4777a1a3efea8d8666975957e9bd089c5c370b29a69f4
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb