Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe
-
Size
217KB
-
MD5
99f386d95a0278bb887637ddf9110630
-
SHA1
46f0bcfc86b853a320065fd09642a7e077d6d837
-
SHA256
814ffaf1e3a33e2a9d96af59cb386baf994f548094b529961fd87b282d077986
-
SHA512
32b607e7bc1ab707787d29241c06f6748589f9db3152efd9a6c18117246016a82df94e85a8ef7037d03d812043a3328ccf9a9cf905b2b782ff1a1fd9e79444dc
-
SSDEEP
6144:PnyiqVQBf0EaIp8fkTJJsK1eEzEB1XjrkXb:gEdp8csKpE7XX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4588 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\af959c8c = "C:\\Windows\\apppatch\\svchost.exe" 99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe -
Drops file in Program Files directory 34 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1036 99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1036 99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe Token: SeSecurityPrivilege 1036 99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe Token: SeSecurityPrivilege 4588 svchost.exe Token: SeSecurityPrivilege 4588 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1036 wrote to memory of 4588 1036 99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe 82 PID 1036 wrote to memory of 4588 1036 99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe 82 PID 1036 wrote to memory of 4588 1036 99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\99f386d95a0278bb887637ddf9110630_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
217KB
MD56c1f57a89bcaec9685490b232d2d388b
SHA1d69dd7e239634d94b6aa6f95267c63c6d251325b
SHA25643d008918a1b1bfd437a6e2c2a52aaaca89943ea4ce2684402e119038868583c
SHA512b1c804fdd7c7907865bf72c7bd2a9ad0ad9d3f6cde03764ebf42e58a96cd007857faf7cff4048bf50f3eb651242d8c574d9a9155a160ce96b2d9708f264bcc59