Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe
-
Size
383KB
-
MD5
1a57255d4fd7b8b953915f49460edb20
-
SHA1
1d36883ba5f2a2087fbdc01648d7259e58ed911a
-
SHA256
f47c05f7b964cc637f3126cd57559a509848cd9b6ee21978b748e955dd9a3487
-
SHA512
618872ea375d0a94258d23d6858b4c0e25b24fa98bc58cadfecd3acd222f38205e8e2b5cd1f450f530085675c96bbe05fdd60397d8ef1f8d7c52a3a2b7988dcb
-
SSDEEP
6144:wlj7cMnI+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCC:wlbI+8U66b5zhVymA/XSRh3
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3632 MSWDM.EXE 3644 MSWDM.EXE 3436 1A57255D4FD7B8B953915F49460EDB20_NEIKIANALYTICS.EXE 2816 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe File opened for modification C:\Windows\dev4A38.tmp 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe File opened for modification C:\Windows\dev4A38.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3644 MSWDM.EXE 3644 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3308 wrote to memory of 3632 3308 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 83 PID 3308 wrote to memory of 3632 3308 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 83 PID 3308 wrote to memory of 3632 3308 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 83 PID 3308 wrote to memory of 3644 3308 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 84 PID 3308 wrote to memory of 3644 3308 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 84 PID 3308 wrote to memory of 3644 3308 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 84 PID 3644 wrote to memory of 3436 3644 MSWDM.EXE 85 PID 3644 wrote to memory of 3436 3644 MSWDM.EXE 85 PID 3644 wrote to memory of 2816 3644 MSWDM.EXE 86 PID 3644 wrote to memory of 2816 3644 MSWDM.EXE 86 PID 3644 wrote to memory of 2816 3644 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3632
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev4A38.tmp!C:\Users\Admin\AppData\Local\Temp\1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\1A57255D4FD7B8B953915F49460EDB20_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:3436
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev4A38.tmp!C:\Users\Admin\AppData\Local\Temp\1A57255D4FD7B8B953915F49460EDB20_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD5dd73061ab8fbcef0a8c8efbb54e7791d
SHA101cba6166c958cc8aead2391efe21da7916ef253
SHA256567eb10a7c3abb98417fd82351e25be49bfc5353b355c22a6e47ab76bc671484
SHA51246e98ec41bb1644ddd43d1cbe135233df5ae0e404ec93280ea4c37dac8f6b9188707f573ac98d08d5b082238fc7b93d83f695944f4db9812fcf3f47fcc7e149f
-
Filesize
47KB
MD58281630c34398a6569e720407a61ca05
SHA1d983308e8fe1bab035342cd8d2ddc63cd9ce1ac0
SHA2568f0e45e4b02d7e47c2a82eaf263756167dbc07fb1e50eaf7f8f0b232d4d097e0
SHA512483fab964c6e7899af972bc14101ef225722ff09f544ab2e2dc37f0af781c20b3a526610922c0fe2a1d7dc53ffc7ee0ee6a030bc73b1f2b35f7ea36568945187
-
Filesize
335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f