Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe
-
Size
53KB
-
MD5
617d5ef0d85c23171e6efea7c51920b0
-
SHA1
f4e31de4a35f35f54f5d550904b8af0292f3f12a
-
SHA256
685e88ec6cd41802c943dbd8021a107d09b81729fef259d1672123ad24d287d2
-
SHA512
8af4039ff40fea93589a6c14fb401b2bf7f1c1c3b1fa0adf73bce4fa6101713c265961d14eee461239159114bcb76ea0f3274bcf20ed0f029d97760521b14658
-
SSDEEP
1536:vN1g8r8Qc8eG2Nag07Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:U8eG4X0JJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boakaa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 boakaa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boakaa = "C:\\Users\\Admin\\boakaa.exe" boakaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe 4976 boakaa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4272 617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe 4976 boakaa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4976 4272 617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe 87 PID 4272 wrote to memory of 4976 4272 617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe 87 PID 4272 wrote to memory of 4976 4272 617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe 87 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82 PID 4976 wrote to memory of 4272 4976 boakaa.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\617d5ef0d85c23171e6efea7c51920b0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\boakaa.exe"C:\Users\Admin\boakaa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD55012b722b14fda59b93a6cce243ff19d
SHA14a623b8a6c2a6f113b84d61ad775c07950241c6b
SHA256ab767c0c65d2f9f32cffcebcd189b36321686e3829d86ecbee6106b71febe280
SHA512dae9a41e29d612fd014ee2bbdecf44806ce010c713982249a7de9115136747df75868b88258821bf421d0ba157a2bbeaa79fb71f8e46812a7546f1dc0537caa6