Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 16:47
Behavioral task
behavioral1
Sample
14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe
-
Size
48KB
-
MD5
14f0f3ec3bd115027d442d88ad6e9510
-
SHA1
70a3e065d7c749f348593c61c471107912a2429a
-
SHA256
9487d6e4ca1690ae94ba1bbd16418bfc8739acdb04bd6d6455b4a1d6df70c286
-
SHA512
f0381bb947d9b5afdabf0365efd6db7db5732236d10d54fd5cfc4a873d5bdf9d1021d89bd308d583f0ea4f216441244b2cad5de6df3b106e36ec901fcc0bea9c
-
SSDEEP
1536:yoMuwospyudrnMjVhDIP4ka3q3oaQOF4nouy8Br:DMcsEknMLDIFEOKoutBr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 5064 services.exe 3932 services.exe -
resource yara_rule behavioral2/memory/2420-0-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/files/0x00080000000233f0-16.dat upx behavioral2/memory/2420-29-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5064-31-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3932-33-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-37-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/5064-39-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3932-40-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-41-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-44-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-49-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-52-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-53-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-55-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-59-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-62-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-64-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-67-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-71-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-74-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-76-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-79-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-83-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-85-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3932-88-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Essentials = "C:\\Users\\Admin\\AppData\\Roaming\\services.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Essentials = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Essentials = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" services.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5064 set thread context of 3932 5064 services.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe 5064 services.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1428 2420 14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe 82 PID 2420 wrote to memory of 1428 2420 14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe 82 PID 2420 wrote to memory of 1428 2420 14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe 82 PID 1428 wrote to memory of 4256 1428 cmd.exe 85 PID 1428 wrote to memory of 4256 1428 cmd.exe 85 PID 1428 wrote to memory of 4256 1428 cmd.exe 85 PID 2420 wrote to memory of 5064 2420 14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe 86 PID 2420 wrote to memory of 5064 2420 14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe 86 PID 2420 wrote to memory of 5064 2420 14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe 86 PID 5064 wrote to memory of 3932 5064 services.exe 91 PID 5064 wrote to memory of 3932 5064 services.exe 91 PID 5064 wrote to memory of 3932 5064 services.exe 91 PID 5064 wrote to memory of 3932 5064 services.exe 91 PID 5064 wrote to memory of 3932 5064 services.exe 91 PID 5064 wrote to memory of 3932 5064 services.exe 91 PID 5064 wrote to memory of 3932 5064 services.exe 91 PID 5064 wrote to memory of 3932 5064 services.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\14f0f3ec3bd115027d442d88ad6e9510_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\syZDM.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft Essentials" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\services.exe" /f3⤵
- Adds Run key to start application
PID:4256
-
-
-
C:\Users\Admin\AppData\Roaming\services.exe"C:\Users\Admin\AppData\Roaming\services.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Roaming\services.exeC:\Users\Admin\AppData\Roaming\services.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD530158d29e765707d6c1f38d4ea60f91b
SHA1e02d5cc507e7f77c0a7f879e3596bd279ddf1f97
SHA256c64a62b30b3ef9c2bb43438659cbbe1d57c1c762d4d58ebf9d188d409421e6f9
SHA5122e72f9529063d74530cc29d04b92837496983d9417c91890ce8a616076889a13f0b1cd7954390b83a3e2e946696e4b7bbb4605b145ad5aa7904f051068ff5ff1
-
Filesize
48KB
MD53c0682ee10801699da1fc598c0d10f36
SHA121993293adf0abfbc0aa492fa73c9e77b6ddac5d
SHA25684d6a8cd2b6c3e2028757749262c26926295542656ab4d2304eba2046d782d4e
SHA512c9e5f7e4dadcbcde3b186195a772f607a8ff02646b4a4d451c6ac201b823d19a441c81455e33d8228e41c1bbbecb6af02789906eb7efa3b8c6bc018c646be01e