Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe
-
Size
40KB
-
MD5
19221f0dd9766ba9f9361f52447f6d20
-
SHA1
26ba3de7e0a5c6bf4efbd3da45a5209dc253fc59
-
SHA256
c1477f99bf737702d1de157b752acc7b4989b78c1027dc4f109b77b7b076b312
-
SHA512
50da9583935a2b5d3461c6cab13eb168f11f665925b569dda221d8e881171b8b4120d8fbccfb9dc6bcb209f70e0fbf70549e4cc179cf4fee3816bf135f2c1e2e
-
SSDEEP
768:kvfko/XiYUsWEzQp8F9bdHXtHs7CQpcdHoCCvc:kEKZWm+8F95NWee1vc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 2572 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2572 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 2572 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 2572 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 2572 2288 19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\19221f0dd9766ba9f9361f52447f6d20_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5f08a412dde11d9c12db31326b74c435a
SHA107bc2d1ad68817c8407b0ccadcef65ea4b2577bb
SHA256a0ac940ba18057b9ccbc92dbb4ffb73dc0445f6c2b497965a766a845cac33296
SHA512b177130f206efe559e1f3a096bb0aa694f3489b81b07e4321b343d33f5f11af33027d9709e4a2111700438c139b565be03a0b66cac06162c0a9c322d48a923c7