Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 02:27
Behavioral task
behavioral1
Sample
8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe
-
Size
521KB
-
MD5
8f6de4f265f6a4805215531b3f88dd90
-
SHA1
9f9091f272ea6499393a6abaf06d83e0be5b9052
-
SHA256
141774eca9c4d74eaf7a2e617b5e92c8138c80fe49cf0aa388a4cc72a6739e02
-
SHA512
364bdb2a2c8ea5114bd4c2cdb7428be6e4b8a93b21a583be7a9a48030ee0566b44e42350db6ad4487d34c4f3973b2eb4d86809177ff2e5f9f9b0b36775ab1a44
-
SSDEEP
12288:HP0JHPs1gL5pRTcAkS/3hzN8qE43fm78V:4B5jcAkSYqyE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe fsb.exe" tmp240609796.exe -
Executes dropped EXE 2 IoCs
pid Process 452 tmp240609796.exe 3912 tmp240609812.exe -
resource yara_rule behavioral2/memory/4972-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022aab-17.dat upx behavioral2/memory/4972-11-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\fsb.stb tmp240609796.exe File created C:\Windows\SysWOW64\fsb.tmp tmp240609796.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240609796.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Uninstall.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\servertool.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe- tmp240609796.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe tmp240609796.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe- tmp240609796.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe tmp240609796.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice.exe tmp240609796.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe- tmp240609796.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe- tmp240609796.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe tmp240609796.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.29\MicrosoftEdgeComRegisterShellARM64.exe tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\javah.exe- tmp240609796.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe tmp240609796.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe- tmp240609796.exe File created C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe- tmp240609796.exe File created C:\Program Files\Java\jre-1.8\bin\klist.exe tmp240609796.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe- tmp240609796.exe File created C:\Program Files\Microsoft Office\root\Office16\misc.exe- tmp240609796.exe File created C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE tmp240609796.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe tmp240609796.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe tmp240609796.exe File created C:\Program Files\Java\jre-1.8\bin\klist.exe- tmp240609796.exe File created C:\Program Files\Java\jre-1.8\bin\rmid.exe tmp240609796.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_93484\javaw.exe tmp240609796.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\pwahelper.exe tmp240609796.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\java.exe tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\jhat.exe- tmp240609796.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE- tmp240609796.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe- tmp240609796.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\pipanel.exe- tmp240609796.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe tmp240609796.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe- tmp240609796.exe File created C:\Program Files\Microsoft Office\root\Office16\msoia.exe- tmp240609796.exe File created C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe tmp240609796.exe File created C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe tmp240609796.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe- tmp240609796.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\wsimport.exe tmp240609796.exe File created C:\Program Files\Java\jre-1.8\bin\java.exe tmp240609796.exe File created C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE- tmp240609796.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\jstat.exe- tmp240609796.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE- tmp240609796.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe- tmp240609796.exe File created C:\Program Files\Common Files\microsoft shared\ink\mip.exe tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\java.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\javac.exe- tmp240609796.exe File created C:\Program Files\Internet Explorer\iediagcmd.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe tmp240609796.exe File created C:\Program Files\Java\jre-1.8\bin\javacpl.exe tmp240609796.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\javapackager.exe tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe tmp240609796.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe- tmp240609796.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\MicrosoftEdgeUpdate.exe tmp240609796.exe File created C:\Program Files\Internet Explorer\ExtExport.exe tmp240609796.exe File created C:\Program Files\Java\jre-1.8\bin\ktab.exe tmp240609796.exe File created C:\Program Files\Java\jre-1.8\bin\tnameserv.exe- tmp240609796.exe File created C:\Program Files\Java\jdk-1.8\bin\rmid.exe tmp240609796.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4972 wrote to memory of 452 4972 8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe 85 PID 4972 wrote to memory of 452 4972 8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe 85 PID 4972 wrote to memory of 452 4972 8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe 85 PID 4972 wrote to memory of 3912 4972 8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe 86 PID 4972 wrote to memory of 3912 4972 8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8f6de4f265f6a4805215531b3f88dd90_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\tmp240609796.exeC:\Users\Admin\AppData\Local\Temp\tmp240609796.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240609812.exeC:\Users\Admin\AppData\Local\Temp\tmp240609812.exe2⤵
- Executes dropped EXE
PID:3912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
607KB
MD5f9418a422e5ae2327ab28ff1fe8e6a5d
SHA112b60363dda5e6cce9e31e12a8329fbb077777a8
SHA2569d6840c39dcfec7831e8aaa3a55bf4a0807a73f04038d1ab4518008e0ea44d84
SHA512cdce40d4d30938248bbc126ec53797ae69b047f26afc20e79b68f3120eca2be0ba649956feeb9d5b9caaeee3e97fc70fda2b08d0b0e0dd779a66c8a2ac8f9230
-
Filesize
52KB
MD56d35c2c2e74d9976b19b9daa48cba217
SHA181131aa145ae2c86b8e9279cd3cc102798425a05
SHA2563d2e7ed1a9677ce8f921f8df782ea63349400f66ff5d1c290df5d9e17dca1c70
SHA5122ce2a6ecead2cc1d831422f583c601ad6468ff0b09c9b4930598d16ce9c3236d75f3ede6ab45d19882c2d6f564f077b3cd62a3222fdc3e704edb8d158b5f8093
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628