Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe
-
Size
215KB
-
MD5
a579c32b527899088bc7e8c014809270
-
SHA1
90d9897aca200ad69eb22bc8162e39992cdc02f9
-
SHA256
ffb375afca402076edd2ac48d39f014c47534ac39028d636dc4781db327e7610
-
SHA512
7744b6b69f6721ff9850c23ea49d20cf2fe3bba39ced74ce3c476e47dc4dc4bc4b80b1e50563121ed0e3e14b403880653fc76c21df5c99f3f8c0cb6fef3d5269
-
SSDEEP
6144:4JcxlKhSGoqTecGy9+hAu7//QnSrMhcZEp:4S8hbTiyqA4QnSQhcZ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3676 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\2a772840 = "C:\\Windows\\apppatch\\svchost.exe" a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe 3676 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1488 a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1488 a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe Token: SeSecurityPrivilege 1488 a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe Token: SeSecurityPrivilege 3676 svchost.exe Token: SeSecurityPrivilege 3676 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1488 wrote to memory of 3676 1488 a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe 83 PID 1488 wrote to memory of 3676 1488 a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe 83 PID 1488 wrote to memory of 3676 1488 a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a579c32b527899088bc7e8c014809270_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
215KB
MD598efe848b1c6abba7c9dff0197afbed0
SHA1fa34c5ea9423c565b4d1fd4582eb3302326aa999
SHA25661beacb0272adf9c91d8c8cb86503ff9fd466f2d8272b9e592e4dd48a923a301
SHA5123eee1a991c2914a56de036791113250fc8fa5630b3e14d92d363603c764f7013bb32bb56cef8d7fade901f918368348a1646b118dd3e7bcd6021f0f53cd08c67