Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 07:07
Behavioral task
behavioral1
Sample
24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe
-
Size
1.7MB
-
MD5
24215bf60eb7eba8c0e01441d76bd410
-
SHA1
72fc342eb06923834d636a3f8ed6c60bb34a162d
-
SHA256
55428d7ab21866ead8e96311f3dab6a5e93540e81e59d1899083db0d2e829893
-
SHA512
c8a9065183bb438a42b3bd68ccdc2908aced971058f2cdfb4adf16d0e09a1bd7535dfed9d43b70a25a417ace717335ce97a8eb524bedeaf4edc028015428124f
-
SSDEEP
24576:dTWbrtYJ0iEW8sHg4UQmVh0VyzxfuT3Ckh22prGviyBKT3qduVIzuSYpLzKOb:dTWNYbMQmVh013lEuyvirTNVIdyb
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe -
Executes dropped EXE 4 IoCs
pid Process 1176 explorku.exe 3896 explorku.exe 1624 explorku.exe 2984 explorku.exe -
resource yara_rule behavioral2/memory/216-0-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/memory/216-1-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/memory/216-2-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/memory/216-4-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/memory/216-8-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/memory/216-7-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/memory/216-6-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/memory/216-5-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/memory/216-3-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/files/0x0007000000023422-14.dat themida behavioral2/memory/1176-25-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1176-23-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1176-24-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1176-22-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/216-21-0x00000000009E0000-0x0000000000F30000-memory.dmp themida behavioral2/memory/1176-27-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1176-30-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1176-29-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1176-28-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1176-26-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-32-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-38-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-37-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-40-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-39-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-36-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-35-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-33-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-34-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/3896-42-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1176-43-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1624-56-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1624-55-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1624-57-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1624-54-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1624-53-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1624-52-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1624-50-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1624-51-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/1624-58-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/2984-66-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/2984-68-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/2984-72-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/2984-73-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/2984-71-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/2984-70-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/2984-69-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/2984-67-0x0000000000230000-0x0000000000780000-memory.dmp themida behavioral2/memory/2984-75-0x0000000000230000-0x0000000000780000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorku.job 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 1176 216 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe 84 PID 216 wrote to memory of 1176 216 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe 84 PID 216 wrote to memory of 1176 216 24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\24215bf60eb7eba8c0e01441d76bd410NeikiAnalytics.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3896
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1624
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD524215bf60eb7eba8c0e01441d76bd410
SHA172fc342eb06923834d636a3f8ed6c60bb34a162d
SHA25655428d7ab21866ead8e96311f3dab6a5e93540e81e59d1899083db0d2e829893
SHA512c8a9065183bb438a42b3bd68ccdc2908aced971058f2cdfb4adf16d0e09a1bd7535dfed9d43b70a25a417ace717335ce97a8eb524bedeaf4edc028015428124f