Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe
-
Size
284KB
-
MD5
b0b328d93eb4006ef6a025f6933c99e0
-
SHA1
22630767616437241403c51e94888c0c163c8c2e
-
SHA256
39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa
-
SHA512
8d5735ad490f71d2766e6cd8aea73765c14c38ab3bdfbdc040df2867c5bc19622ce2333d1ebb333f94d3d56d0f001638329b32389de2ff5d3608d382f3d7af05
-
SSDEEP
3072:KSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lu:KPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\57416 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msrtbicyf.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 89732 skyrpe.exe 34528 skyrpe.exe 34592 skyrpe.exe -
Loads dropped DLL 5 IoCs
pid Process 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/89124-53482-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/89124-53484-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/89124-53487-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/89124-53488-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/89124-53489-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/89124-53683-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/34528-106963-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/89124-106971-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/34528-106984-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2352 set thread context of 89124 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 28 PID 89732 set thread context of 34528 89732 skyrpe.exe 35 PID 89732 set thread context of 34592 89732 skyrpe.exe 36 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msrtbicyf.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 34592 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 34592 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe Token: SeDebugPrivilege 34528 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 89732 skyrpe.exe 34528 skyrpe.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2352 wrote to memory of 89124 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 28 PID 2352 wrote to memory of 89124 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 28 PID 2352 wrote to memory of 89124 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 28 PID 2352 wrote to memory of 89124 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 28 PID 2352 wrote to memory of 89124 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 28 PID 2352 wrote to memory of 89124 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 28 PID 2352 wrote to memory of 89124 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 28 PID 2352 wrote to memory of 89124 2352 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 28 PID 89124 wrote to memory of 89500 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 29 PID 89124 wrote to memory of 89500 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 29 PID 89124 wrote to memory of 89500 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 29 PID 89124 wrote to memory of 89500 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 29 PID 89500 wrote to memory of 89672 89500 cmd.exe 31 PID 89500 wrote to memory of 89672 89500 cmd.exe 31 PID 89500 wrote to memory of 89672 89500 cmd.exe 31 PID 89500 wrote to memory of 89672 89500 cmd.exe 31 PID 89124 wrote to memory of 89732 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 32 PID 89124 wrote to memory of 89732 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 32 PID 89124 wrote to memory of 89732 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 32 PID 89124 wrote to memory of 89732 89124 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 32 PID 89732 wrote to memory of 34528 89732 skyrpe.exe 35 PID 89732 wrote to memory of 34528 89732 skyrpe.exe 35 PID 89732 wrote to memory of 34528 89732 skyrpe.exe 35 PID 89732 wrote to memory of 34528 89732 skyrpe.exe 35 PID 89732 wrote to memory of 34528 89732 skyrpe.exe 35 PID 89732 wrote to memory of 34528 89732 skyrpe.exe 35 PID 89732 wrote to memory of 34528 89732 skyrpe.exe 35 PID 89732 wrote to memory of 34528 89732 skyrpe.exe 35 PID 89732 wrote to memory of 34592 89732 skyrpe.exe 36 PID 89732 wrote to memory of 34592 89732 skyrpe.exe 36 PID 89732 wrote to memory of 34592 89732 skyrpe.exe 36 PID 89732 wrote to memory of 34592 89732 skyrpe.exe 36 PID 89732 wrote to memory of 34592 89732 skyrpe.exe 36 PID 89732 wrote to memory of 34592 89732 skyrpe.exe 36 PID 89732 wrote to memory of 34592 89732 skyrpe.exe 36 PID 34592 wrote to memory of 34640 34592 skyrpe.exe 37 PID 34592 wrote to memory of 34640 34592 skyrpe.exe 37 PID 34592 wrote to memory of 34640 34592 skyrpe.exe 37 PID 34592 wrote to memory of 34640 34592 skyrpe.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:89124 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OWOBD.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:89500 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
PID:89672
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:89732 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:34528
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:34592 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:34640
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD5655c9fa33f9fe40c10d6757cb57d5b4b
SHA19f9cc4b1c27b1abc8daba3263dc04de38e5b5132
SHA25612433e7e487a11c7c541e41f552d104647d2fbaf22d03739dad291a4e953b573
SHA512564205eda18bcac1c3caa391c7cdd92d4d9d69c6653d6257bf093d91295881810b52a4a2dab7e8a9c13a2c9abe094c5edd343a97fc0b5b945a6432e9940de9c2