Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe
-
Size
215KB
-
MD5
c2d737e317f2906d2f55a28a14b89fe0
-
SHA1
dffdefa7ace4362609f1bdec36a2152b385f1aa0
-
SHA256
d59ba356a888eeebd1645985dbed21e09ff6d04085366f7cb09db6410e6147df
-
SHA512
ed4686a9b671bc5ecfc66b2306f1a189853b8c9db1a3eabaad041af6904a9259f5fc68e384ddbc46abcb6d1155b15c0698b32d4b47dac5b17acc7bdf35e795ec
-
SSDEEP
6144:rJcxlKhSGoqTecGy9+hAu7//QnSrMhcZEp:rS8hbTiyqA4QnSQhcZ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3980 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\8ad5aa80 = "C:\\Windows\\apppatch\\svchost.exe" c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe 3980 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3812 c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3812 c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe Token: SeSecurityPrivilege 3812 c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe Token: SeSecurityPrivilege 3980 svchost.exe Token: SeSecurityPrivilege 3980 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3812 wrote to memory of 3980 3812 c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe 83 PID 3812 wrote to memory of 3980 3812 c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe 83 PID 3812 wrote to memory of 3980 3812 c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c2d737e317f2906d2f55a28a14b89fe0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
215KB
MD58669929ee50e93391126867a4f3c4e6b
SHA17d4497b966b22c4ccde081b0a78fb28431fff2c5
SHA256c86d291e07cdbcbd469635d52da9ca6fb99dc89937e54860730edbd57da9b422
SHA512bdab8c89387545b2c724bcfa6291ed1c3d6042c6ef0c1a3c7c02e83e8c05f7327fbce7ae75a8f08574078f6fde23596de1be244a4faa726e28f494fe398fb105