Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe
-
Size
70KB
-
MD5
cca746fead062b9074131beb2dedb1d0
-
SHA1
906f24f69e58c4d8d43ca4410595b5d39ff9a702
-
SHA256
76d5b5f29abc02b7bef35d859ffb6687a86efbc0ce180235851ee11bcb64e356
-
SHA512
503c4ffe8f58bf250c9fedffd01aa64af14935e45f68e03d96dff561ba816c857493250bdbe659cfb49d4b1ae84c522a503296a3f83c9a3f9444fbde06899be2
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8sla8:Olg35GTslA5t3/w858
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" eammoosat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" eammoosat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" eammoosat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" eammoosat.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52494A54-4f4f-5658-5249-4A544F4F5658}\StubPath = "C:\\Windows\\system32\\affatab.exe" eammoosat.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52494A54-4f4f-5658-5249-4A544F4F5658} eammoosat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52494A54-4f4f-5658-5249-4A544F4F5658}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" eammoosat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52494A54-4f4f-5658-5249-4A544F4F5658}\IsInstalled = "1" eammoosat.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe eammoosat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" eammoosat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ouvxoanab.exe" eammoosat.exe -
Executes dropped EXE 2 IoCs
pid Process 1924 eammoosat.exe 2600 eammoosat.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" eammoosat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" eammoosat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" eammoosat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" eammoosat.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} eammoosat.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify eammoosat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" eammoosat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\omdapic-cid.dll" eammoosat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" eammoosat.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\omdapic-cid.dll eammoosat.exe File opened for modification C:\Windows\SysWOW64\eammoosat.exe eammoosat.exe File opened for modification C:\Windows\SysWOW64\eammoosat.exe cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\ouvxoanab.exe eammoosat.exe File created C:\Windows\SysWOW64\ouvxoanab.exe eammoosat.exe File opened for modification C:\Windows\SysWOW64\affatab.exe eammoosat.exe File opened for modification C:\Windows\SysWOW64\omdapic-cid.dll eammoosat.exe File created C:\Windows\SysWOW64\eammoosat.exe cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\affatab.exe eammoosat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 2600 eammoosat.exe 2600 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe 1924 eammoosat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4088 cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe Token: SeDebugPrivilege 1924 eammoosat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4088 wrote to memory of 1924 4088 cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe 83 PID 4088 wrote to memory of 1924 4088 cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe 83 PID 4088 wrote to memory of 1924 4088 cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe 83 PID 1924 wrote to memory of 608 1924 eammoosat.exe 5 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 2600 1924 eammoosat.exe 84 PID 1924 wrote to memory of 2600 1924 eammoosat.exe 84 PID 1924 wrote to memory of 2600 1924 eammoosat.exe 84 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55 PID 1924 wrote to memory of 3480 1924 eammoosat.exe 55
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\cca746fead062b9074131beb2dedb1d0_NeikiAnalytics.exe"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\eammoosat.exe"C:\Windows\system32\eammoosat.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\eammoosat.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5fccffbef09700d55cccab5d919a9d6ae
SHA127ea748c16699a69fc5d9c503c6d8f932dc19aec
SHA256ed85e698d475fc9ef30e29f7edb408da31b8a876f220d168eda0469173643df7
SHA512c2528c674e790d05c49c8b959208cfc95ab9e90b43f78e26db2d54a5be489ac6a00e0947add76de8ceade5af90268793f162e86301aec760c733856942b32194
-
Filesize
70KB
MD5cca746fead062b9074131beb2dedb1d0
SHA1906f24f69e58c4d8d43ca4410595b5d39ff9a702
SHA25676d5b5f29abc02b7bef35d859ffb6687a86efbc0ce180235851ee11bcb64e356
SHA512503c4ffe8f58bf250c9fedffd01aa64af14935e45f68e03d96dff561ba816c857493250bdbe659cfb49d4b1ae84c522a503296a3f83c9a3f9444fbde06899be2
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
74KB
MD539a4e9e6d40db777d52d5fdd07a49548
SHA1c748af42906296bd0cc96a7ccd66bcadf824cca3
SHA256c982493b6311777ea39fe89d969b56b2ac3ba0274c1e3eccca52b18cdec8372d
SHA512e70486c0702eb1ec3022164a105a6692e005e05e46b3dcbd21dea7dcbaa2830d6e50dd0c186cd3085e4502463295ac71a5e6df22ac9c14ff68ecca7d3b745adf