Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe
-
Size
12KB
-
MD5
db9d44868f38f3b02be940cf7300c1d0
-
SHA1
3ae2233685f26a6997e986bdf1728962a01364e9
-
SHA256
1a33ed5ee50b86dea6ac282a8ceea48ac6b92a9d573e56c944bb449ee8741e58
-
SHA512
3f766eac26841590ca410a9c9a97b7badd0c4a7b7bb621b5393585bd5f67545cd194ca6a8d9d12c18ecf299230aeb5d8cad7dddbafecdaac91eef8ec5fba3336
-
SSDEEP
384:5L7li/2zSq2DcEQvdhcJKLTp/NK9xarX:J6M/Q9crX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2884 tmp1640.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2884 tmp1640.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2204 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe 28 PID 2148 wrote to memory of 2204 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe 28 PID 2148 wrote to memory of 2204 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe 28 PID 2148 wrote to memory of 2204 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe 28 PID 2204 wrote to memory of 2668 2204 vbc.exe 30 PID 2204 wrote to memory of 2668 2204 vbc.exe 30 PID 2204 wrote to memory of 2668 2204 vbc.exe 30 PID 2204 wrote to memory of 2668 2204 vbc.exe 30 PID 2148 wrote to memory of 2884 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe 31 PID 2148 wrote to memory of 2884 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe 31 PID 2148 wrote to memory of 2884 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe 31 PID 2148 wrote to memory of 2884 2148 db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vga2c31p\vga2c31p.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1890.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEA2CB2EBC6A34F68AC85ACFF53963713.TMP"3⤵PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp1640.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1640.tmp.exe" C:\Users\Admin\AppData\Local\Temp\db9d44868f38f3b02be940cf7300c1d0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5159c107fd08487bb3d3b18121ceab8c4
SHA1bacf0634e95321c489fa9c04884f1a90696e07af
SHA2565cfc2000d96e96a249f212e9b03c7d813906f983f3572879626f9faa684e1687
SHA512b953a17ab8b5640bbbd1900083ac1a897f09d6522bff0952b4d55d5e9e8c1309d57dfe1093bd647630905d645dd2a246ff3444a40cccaa1fbc2ab324f843161d
-
Filesize
1KB
MD5d25be24c14a87beb208b91e0a84c948b
SHA1f4f749f87b7329bcec7da58d450783c2d8926919
SHA25604b2161e81497358e1af1e7560d9eb56cd315864fdd467278b6661b3cdb8ad7f
SHA51267209c48121930a0f8acc4e4f76f9e57e308c4b409c8a1df6a741da8b88e4cda071eced25b09128e154d2353b54f01719de677bca6738c83256f32674c9c626b
-
Filesize
12KB
MD53f3962f38d040e7f26d4128fdfea6e49
SHA19ec8751c2f3e2c54bf1ce5b5e0d11233b3dfb3b3
SHA25659ea672b443d61ee6c10c363d648132bbe02de6ea3cba76e5b207689d1c1c3d8
SHA51261a3001473d6a153cc1427819c207002e11d9c64735db7acf2426bc1b0032c5cd1650b76cca6db273d773fc7e5b45513014ce414c472b22bedc9b8d27874cb79
-
Filesize
1KB
MD5c81c426d9cc909692b76e5aa032b068f
SHA1b4894e0eb838818360d44f32b92745c4d35b3a97
SHA2569fbeddedd9526afa8058375a2f6053e671e5fb599bf5e816f19016e33a837378
SHA5125722cefe2744306e91023ca5623f75a07ee2d412341d31d8f236236d1bd350bfcc48dc7c757340ffe0aebed77113041ec718e8cf85027095190db3cf0b87de93
-
Filesize
2KB
MD521303903aa90e227af6bbdae014152b5
SHA19dfab9828827d9370b8c65641e9b1b5b77a2e4c1
SHA2569fd46c542828c6dccd0aec7bbccc4601515d7ba61a3974d91cd0570fc30e1d29
SHA512fd8ad92637aaeee6233a023f1bb162455f984cd52d36f97e34eddfcb5ed3ab5abb45c2feceddc91638e63e408b1e88bf4987f4aaa4997f50df3e27d3a841d0a6
-
Filesize
273B
MD51a8834aefc6f925f3f2f31ad420827f7
SHA1f0509150d89064b654ae056c50449b2d2efc7cdc
SHA256b0114d849dc559778b353dba243feb2be9a378abd7ce6b85c2ff3e1310b51ad0
SHA51225f3ebf1e54f662b176b0e3dd5a10d710f857bab0e0330e0f64b4886eb6d5c5c7d6ea6f33dd65b1516c954c53d010f9bc9be6fae1dee301b22579a5a1be5c1fd