Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe
-
Size
576KB
-
MD5
ad1bf93fc58c4331968a6706a44569d0
-
SHA1
51a7498d6686052b7bdeab886a0c40a8f82bf5b0
-
SHA256
ea0f6dab013ad148c30498083b17bf7cd712bde365cdbc431ff05eb89e98ea1e
-
SHA512
ab5a7b4d8a5ac457cd102c9af21f337319dee45b15f507f4ed350354a0e289966b85df015a132f812902332dd981bd8c48aa2586d6896f87b366d6ded2014228
-
SSDEEP
12288:sYIW0p98Oh8P7h8tT+ECMipUPq7SD4cJEJf+Kvo/u:gW298E8utaZX7uJEJf+Kvo/u
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 1390.tmp -
Loads dropped DLL 1 IoCs
pid Process 2936 ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2820 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1680 1390.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 WINWORD.EXE 2820 WINWORD.EXE 2820 WINWORD.EXE 2820 WINWORD.EXE 2820 WINWORD.EXE 2820 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1680 2936 ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe 28 PID 2936 wrote to memory of 1680 2936 ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe 28 PID 2936 wrote to memory of 1680 2936 ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe 28 PID 2936 wrote to memory of 1680 2936 ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe 28 PID 1680 wrote to memory of 2820 1680 1390.tmp 29 PID 1680 wrote to memory of 2820 1680 1390.tmp 29 PID 1680 wrote to memory of 2820 1680 1390.tmp 29 PID 1680 wrote to memory of 2820 1680 1390.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\1390.tmp"C:\Users\Admin\AppData\Local\Temp\1390.tmp" --pingC:\Users\Admin\AppData\Local\Temp\ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.exe 7B481FCB0399CA33E18AD5EC8F443AA475394612E4E9FC4C9528BCC9F39C3251D040DE8A3B90248C67696D6225B0B73CA0D87BE8F8E7BB4D1381163FF2E314B12⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ad1bf93fc58c4331968a6706a44569d0_NeikiAnalytics.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
576KB
MD549d03d914b7c58c1e3adaa3ed0cedefd
SHA1ade2daf3fbc2a6f0711598be62295c799b8a034f
SHA2564c81a5c5f9b2a09351a9a1a7cc2eac20486c5a9de91897270f063951c2f0ec47
SHA5129669e0c55db2382ad01962e01051197969332c7b5bad702d801621f1248ea4ee089ccf75bd0e057fe4be7607bb7026b592deaceec212a5d97fff9d7562f9e6d4