Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe
-
Size
140KB
-
MD5
f00aac4b518fe654d5f26a9170dc5870
-
SHA1
2b54eb71dc16f3c5b9f6aa65b40e0fef65a00bf1
-
SHA256
ddbb349d8471f651c3d8242d1dac297488c5f241783c17f542ae9c5f450fdad6
-
SHA512
8f4fa3e6c70d7d141612f8a181c2f5762d82d26900fd4e7bafe3d12c205958968a1f7f7500d4a6478736119bf086400f4f8bf2195288d2d494bd7bd6f974a98f
-
SSDEEP
3072:HQC/yj5JO3MndG+Hu54Fx4xE8CJvxKaCqTBfioom:wlj7cMn0+OEXDtCqTBNom
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3016 MSWDM.EXE 2528 MSWDM.EXE 2140 F00AAC4B518FE654D5F26A9170DC5870_NEIKIANALYTICS.EXE 2716 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 3016 MSWDM.EXE 3016 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe File opened for modification C:\Windows\dev16DB.tmp f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe File opened for modification C:\Windows\dev16DB.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3016 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2528 2216 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 28 PID 2216 wrote to memory of 2528 2216 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 28 PID 2216 wrote to memory of 2528 2216 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 28 PID 2216 wrote to memory of 2528 2216 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 28 PID 2216 wrote to memory of 3016 2216 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 29 PID 2216 wrote to memory of 3016 2216 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 29 PID 2216 wrote to memory of 3016 2216 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 29 PID 2216 wrote to memory of 3016 2216 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 29 PID 3016 wrote to memory of 2140 3016 MSWDM.EXE 30 PID 3016 wrote to memory of 2140 3016 MSWDM.EXE 30 PID 3016 wrote to memory of 2140 3016 MSWDM.EXE 30 PID 3016 wrote to memory of 2140 3016 MSWDM.EXE 30 PID 3016 wrote to memory of 2716 3016 MSWDM.EXE 31 PID 3016 wrote to memory of 2716 3016 MSWDM.EXE 31 PID 3016 wrote to memory of 2716 3016 MSWDM.EXE 31 PID 3016 wrote to memory of 2716 3016 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2528
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev16DB.tmp!C:\Users\Admin\AppData\Local\Temp\f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\F00AAC4B518FE654D5F26A9170DC5870_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2140
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev16DB.tmp!C:\Users\Admin\AppData\Local\Temp\F00AAC4B518FE654D5F26A9170DC5870_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD55f3c20bcc55d54def41597929afe6593
SHA1551b3ca87e9b59d33764f55aa1fb4258150beb24
SHA2568dfaa56cbb22a1f1a900d411899e63b0d6f38577862824bbfaf15a79188c812a
SHA512885869052fa69f53b9980fb8db1d383227e4b68b7ce85323df4e2da81d49c18eb9544ac26721767a6635e5048facd2a3e758d9d778e849815388296730e6311e
-
Filesize
60KB
MD57b112b1fb864c90ec5b65eab21cb40b8
SHA1e7b73361f722fc7cbb93ef98a8d26e34f4d49767
SHA256751941b4e09898c31791efeb5f90fc7367c89831d4a98637ed505e40763e287b
SHA512bf9cdeff39cc4fa48457c55ad02e3856b5b27998535aed801a469252f01e7676462332fa3f93877753e963d037472f615c1fc5fc2e996316621b4e0a180cb5f5
-
Filesize
80KB
MD57df185229dce03881ee5d401b8881c62
SHA15bf9b9f89ba5c55343626442f95b8ef6add04951
SHA256c97df45dded74f4bb1df6bd969eab17ecb27db9a59a5bef949507ad809e34e51
SHA512c6c84e9a75b9f42e735127cc79a9c47a30c151f123cbe346096aa03f23b1f45157e34e6132ce644841084278673779aff5b20d2e5ed0887f66eb692b3ed69637