Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe
-
Size
208KB
-
MD5
07ca389447166d78e6a2718b647daee0
-
SHA1
77a031025e18e93f5f963b8da7627e156fa58b17
-
SHA256
cb67094f1527902d2610e7ad69a44f082ba9b20faaa35684218394a771fdd26e
-
SHA512
8cc720a346deba183904c9aae7004b30bffa52523a6ecee76880354b3efa413050e86adfeaa398f8fae328e54e92e5e5b63d3a4fa5031d620f286d83ab9eb4d7
-
SSDEEP
6144:va1oB/yvpK0JCmRcRRR8N0e2kXfCqNidkfk:vbapK0JCmRcU9vVokf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 892 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c39c1a59 = "\x1fDa%çÒy¼É‰ÿúFÀ+\x1a" 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c39c1a59 = "\x1fDa%çÒy¼É‰ÿúFÀ+\x1a" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe File created C:\Windows\apppatch\svchost.exe 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe 892 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2696 wrote to memory of 892 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 82 PID 2696 wrote to memory of 892 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 82 PID 2696 wrote to memory of 892 2696 07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\07ca389447166d78e6a2718b647daee0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
457B
MD527d3ea64ef0f44f8002f175950e3dedf
SHA145664f15cc95011360e6e0742ca70ca4443737c2
SHA256e06beacdcc1ad1cfbe80aadb8a62d04c80c45e0e603c63b2e4313bfc32b7f50c
SHA51224eff55499cfcfcad8ec8df6e7648b0f16cb2663b5f7d35d1a77caf8f5c5c08a4ad7eda6752113ecca448704e88d38035c43b77f48487954aae3d0ba607365bb
-
Filesize
42KB
MD5df3d474c213c0b9d5ea8738c66b9f642
SHA1426bc8fb092637d4c778f4df934b38ddb6d5c74a
SHA256676f76905a99a3a356e79ebae0f1966dc01dad05849e9c9302bef1b632246971
SHA512285151c4aa2f3570e5c85f4a5fe5bc7b68e003b7aa16530d74285b5266316b36651f6db7e93bf1b9ef5a19683445540e9e9df95ef5ede2b07de53f13af230405
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
23KB
MD536d37244da46dbd0d571b8e09985ca67
SHA1d64d69dfcee8a46b835ff4b9793377eb2d0bf0b8
SHA256bfe395f3e9f65a292f13782e95068e4b53cfaba42e97e32c026729c6e305cc8a
SHA51242b3d6cb7eec61e4d8a97ee40d87c454a8867dd3dff41dba65f8be09559ea878cd0f7713055612a11c0a96d47f83d1287fc80c8b045c7fbc9e4eb4ca1d09314c
-
Filesize
1KB
MD52cf2c8d1cf21d8c16a5be16a415bc5a9
SHA17c8c96b09f61f868ece7c4d6feed23d25aed4829
SHA2568a904aea35519a0310bf8242d122bea0e7f587867ea0095dff3ab36c6380501c
SHA5129e607691ee3a3e7b2b28080e47d97e4bf214360f3c7b1902aca472b46c4afe26edd0b8dc4ba4806fb64bdf1aad329c18efa7b0f4dbd83deda786ac38df96cc43
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
208KB
MD589664591089cd636029e411d66f2b9e0
SHA1bbf718aefa7329b233055128c20ab951cb7ae699
SHA256f03a24831e1228e7d4a98417cacc828e34c05a6a8911a08a15712c8efa8b762e
SHA512cbe9c722cd3ab0f83a82c3f0e846c67ac18e475b9c283cb4caaab7cafd3fc7e034b27dd06c8c56924339bbd685af94b1768fea7b5fdb54d8e75e35da459a0e23