Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe
-
Size
140KB
-
MD5
f00aac4b518fe654d5f26a9170dc5870
-
SHA1
2b54eb71dc16f3c5b9f6aa65b40e0fef65a00bf1
-
SHA256
ddbb349d8471f651c3d8242d1dac297488c5f241783c17f542ae9c5f450fdad6
-
SHA512
8f4fa3e6c70d7d141612f8a181c2f5762d82d26900fd4e7bafe3d12c205958968a1f7f7500d4a6478736119bf086400f4f8bf2195288d2d494bd7bd6f974a98f
-
SSDEEP
3072:HQC/yj5JO3MndG+Hu54Fx4xE8CJvxKaCqTBfioom:wlj7cMn0+OEXDtCqTBNom
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3280 MSWDM.EXE 2148 MSWDM.EXE 3020 F00AAC4B518FE654D5F26A9170DC5870_NEIKIANALYTICS.EXE 3376 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\dev72DE.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe File opened for modification C:\Windows\dev72DE.tmp f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 MSWDM.EXE 2148 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4708 wrote to memory of 3280 4708 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 3280 4708 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 3280 4708 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 2148 4708 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 88 PID 4708 wrote to memory of 2148 4708 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 88 PID 4708 wrote to memory of 2148 4708 f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe 88 PID 2148 wrote to memory of 3020 2148 MSWDM.EXE 89 PID 2148 wrote to memory of 3020 2148 MSWDM.EXE 89 PID 2148 wrote to memory of 3020 2148 MSWDM.EXE 89 PID 2148 wrote to memory of 3376 2148 MSWDM.EXE 97 PID 2148 wrote to memory of 3376 2148 MSWDM.EXE 97 PID 2148 wrote to memory of 3376 2148 MSWDM.EXE 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3280
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev72DE.tmp!C:\Users\Admin\AppData\Local\Temp\f00aac4b518fe654d5f26a9170dc5870_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\F00AAC4B518FE654D5F26A9170DC5870_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:3020
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev72DE.tmp!C:\Users\Admin\AppData\Local\Temp\F00AAC4B518FE654D5F26A9170DC5870_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD58d42235d51c7471579409b9df23242ed
SHA1cfb2b6c74650ad523ec286f05feda53002829dfc
SHA2567ab64abc774f7b9729269b100802f6be31667e74b844b4eb8e1e2396d4919608
SHA512fe0c97e98ebd52331131598693803d689909141d257faf246f53cdfe5229e51dbbb4792fd08a4585e3e97a5f136a00a9e55a0af70ac3860e07068b1cbe3d3ec8
-
Filesize
80KB
MD57df185229dce03881ee5d401b8881c62
SHA15bf9b9f89ba5c55343626442f95b8ef6add04951
SHA256c97df45dded74f4bb1df6bd969eab17ecb27db9a59a5bef949507ad809e34e51
SHA512c6c84e9a75b9f42e735127cc79a9c47a30c151f123cbe346096aa03f23b1f45157e34e6132ce644841084278673779aff5b20d2e5ed0887f66eb692b3ed69637
-
Filesize
60KB
MD57b112b1fb864c90ec5b65eab21cb40b8
SHA1e7b73361f722fc7cbb93ef98a8d26e34f4d49767
SHA256751941b4e09898c31791efeb5f90fc7367c89831d4a98637ed505e40763e287b
SHA512bf9cdeff39cc4fa48457c55ad02e3856b5b27998535aed801a469252f01e7676462332fa3f93877753e963d037472f615c1fc5fc2e996316621b4e0a180cb5f5