Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
83a7009446886b5a6fcc262cdf8fea00
-
SHA1
c29cae2d6d5c95c87959393bbf4b07d13fc08ab7
-
SHA256
3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0
-
SHA512
8c313c440a73ffd81104b2fa9aa816054598c34429667606ca528eb5c6b4a93b34c57e2d9cfcafd867df72b0ea01e98223495a021a5fe1985c97932f516ac6a1
-
SSDEEP
24576:8mUNJyJqb1FcMap2ATT5emUNJyJqb1FcMap2ATT5emUNJyJqb1FcMap2ATT58:8mV2ApemV2ApemV2Ap8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3908 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\be164f14 = "ÃÝ\x17Í–\u0081\u008f4Td^ä·\u009d}Ê\x18,r¹ÔN\x7f\vï\x7fÿ{J\x02\u009d\x04³Ç¢\u009dÿë\v\x7f\x13£Â…\x13\x18ï“´ pbû\x7fw[ø+Ô²|#\x02w-›\f¢\u008f7\x03ó\x7fsMÐ\x1cT¬¬¨ßê—‡@Û…/ã\x0fS:“»\x7fë ‹x\u008fs\\K¬s\x1b£4z·\x1bP³´#\u008dtƒ„›Ëü\u008dƒõ\x1bïÕzê¨\x03\x0f:\x14ÈàÔÃ{õ\x13Xò|Âý\x04ÚË\fã\x1f\x14,(µO»¬SM}\nÓJÛl«\x1båÛ`$\nO+x{\x1dÓ\x15\x03£Û{K’ÓÛ/ëÃ\x04\\ë`Ã\x05j\x03\u0090\x1bÓˆÛË\\ä\u008d\fß=›ƒ\x10˺G2¸•\x04J«#Šg¨å£¿Tß2\x7fÚÂü‚ƒ=\x05ßÓ€3àx\x17÷úÈûÚrS" 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\be164f14 = "ÃÝ\x17Í–\u0081\u008f4Td^ä·\u009d}Ê\x18,r¹ÔN\x7f\vï\x7fÿ{J\x02\u009d\x04³Ç¢\u009dÿë\v\x7f\x13£Â…\x13\x18ï“´ pbû\x7fw[ø+Ô²|#\x02w-›\f¢\u008f7\x03ó\x7fsMÐ\x1cT¬¬¨ßê—‡@Û…/ã\x0fS:“»\x7fë ‹x\u008fs\\K¬s\x1b£4z·\x1bP³´#\u008dtƒ„›Ëü\u008dƒõ\x1bïÕzê¨\x03\x0f:\x14ÈàÔÃ{õ\x13Xò|Âý\x04ÚË\fã\x1f\x14,(µO»¬SM}\nÓJÛl«\x1båÛ`$\nO+x{\x1dÓ\x15\x03£Û{K’ÓÛ/ëÃ\x04\\ë`Ã\x05j\x03\u0090\x1bÓˆÛË\\ä\u008d\fß=›ƒ\x10˺G2¸•\x04J«#Šg¨å£¿Tß2\x7fÚÂü‚ƒ=\x05ßÓ€3àx\x17÷úÈûÚrS" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe 3908 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 3908 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 83 PID 4296 wrote to memory of 3908 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 83 PID 4296 wrote to memory of 3908 4296 3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3603cae0e9b4682cdb9edfb76f92a67535b9a2de1424249607e298b94005c9b0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
42KB
MD563dde64fbe9b71c82f5a2af907c104aa
SHA10ad50a0beb87cddf8fb5e93917260dfcdfec74cb
SHA256e420fd8190fe424a32c16cecc5e8583a6392d71e84496c490fa7eb9693374dc5
SHA5125b36b97864539bd71e177b96293defcaa1f058b956c6fd52f18b30b83a36699872e2963ca60e7e9feda6ce306fd94a699d3f6d3c9b52745d76368323bc96c4e4
-
Filesize
42KB
MD57fa49a0b5f47a2997da46c6db26d4676
SHA1a25b9ff7b5e3b945bc60d3a24eb793ee472ccd04
SHA256022a538cee805ccf7ce8c85fb508c768756ca495656b59112c7bdd994a9672c8
SHA51206c26161d56c15407ff235618a306f7005b048cfa4baf68bfc1cbdf17026387facfa21c7cb67c8f5f3fa75d73559413d0fddb609715e5e7092e7182b7a79522a
-
Filesize
457B
MD527d3ea64ef0f44f8002f175950e3dedf
SHA145664f15cc95011360e6e0742ca70ca4443737c2
SHA256e06beacdcc1ad1cfbe80aadb8a62d04c80c45e0e603c63b2e4313bfc32b7f50c
SHA51224eff55499cfcfcad8ec8df6e7648b0f16cb2663b5f7d35d1a77caf8f5c5c08a4ad7eda6752113ecca448704e88d38035c43b77f48487954aae3d0ba607365bb
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
1.0MB
MD5c00b9b8d0394867ffd93503a932482e4
SHA1af7be39f90b1e435d7fc9deaff3b7ade7b6a6512
SHA25679502544e8bfd22a99d21404e934d166c45a537d90a7eeac933680d21694514c
SHA51265963145d80b274389e2e0f7288b32f2a8c4aaba900f085650280e9a288995125b802248703c8fc3af1bf54e64ace8faaadd4d8bca79dc1718bbf01cee51e8c5