Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe
-
Size
53KB
-
MD5
70fa3e118f1b5f7d3297b4c82d8e2350
-
SHA1
c05c7ce5798fedb84268c5d1ce5684ae61942761
-
SHA256
531c2f67eabe2f24bcb66b09f9d53fc642851175cc805f610db0549b7e5b3e9c
-
SHA512
a6edbed8ef44f152fd26687efa7811a004281ce4242eb08df26f2e0e9ebb466822005b32487f8646c31e8df30aa41de7f44ef80ce825a01eb6f7d04cc6b4acf5
-
SSDEEP
1536:vN7g8r8QLWQbDR7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:dWQbDRJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wfkiej.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1816 wfkiej.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfkiej = "C:\\Users\\Admin\\wfkiej.exe" wfkiej.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe 1816 wfkiej.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4296 70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe 1816 wfkiej.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 1816 4296 70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe 87 PID 4296 wrote to memory of 1816 4296 70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe 87 PID 4296 wrote to memory of 1816 4296 70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe 87 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82 PID 1816 wrote to memory of 4296 1816 wfkiej.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\70fa3e118f1b5f7d3297b4c82d8e2350_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\wfkiej.exe"C:\Users\Admin\wfkiej.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5ea4a23f205e99abf431ca9c644878b32
SHA17f3ecda7a6d2af268056df8cbfbb4335b6a40e75
SHA256d3fdeb1f627fb5bacc35705fd3e2533860f1398f6680bb9e672ebc7ad35f1337
SHA5121c2569c6f760aecc86af15b9f013bcea9070793064ff9cfa3df840c19003ff4dac398c6169680afa1f0a905f0d8916652c5b12b92a9a1fcbd2f6a7c25c919786