Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
3abd05cfdb8cd529b9b31dde1719f8f0
-
SHA1
f66e887f0a6c0cbc2ce56cce1d017300f7e9d44f
-
SHA256
b88342ddb0238f9bd7f39971baaf9a086cf5cbf8abf72d1eec78170046c33b7a
-
SHA512
78351a8d7e30b9259577c36f975de1ac43c02894170c8fa22be6ec468bbd65b7af5d0579a27e61a64c28ffdbe02f11f8180da7f220bf41fe919a6d1a7482c25d
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiH:IeklMMYJhqezw/pXzH9iH
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/5056-36-0x00000000751F0000-0x000000007534D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 232 explorer.exe 4852 spoolsv.exe 5056 svchost.exe 3152 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4388 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 4388 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 232 explorer.exe 232 explorer.exe 232 explorer.exe 232 explorer.exe 232 explorer.exe 232 explorer.exe 232 explorer.exe 232 explorer.exe 5056 svchost.exe 5056 svchost.exe 5056 svchost.exe 5056 svchost.exe 5056 svchost.exe 232 explorer.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 5056 svchost.exe 232 explorer.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 232 explorer.exe 5056 svchost.exe 5056 svchost.exe 5056 svchost.exe 232 explorer.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 5056 svchost.exe 232 explorer.exe 232 explorer.exe 5056 svchost.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 5056 svchost.exe 232 explorer.exe 232 explorer.exe 5056 svchost.exe 5056 svchost.exe 232 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 232 explorer.exe 5056 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4388 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 4388 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 232 explorer.exe 232 explorer.exe 4852 spoolsv.exe 4852 spoolsv.exe 5056 svchost.exe 5056 svchost.exe 3152 spoolsv.exe 3152 spoolsv.exe 232 explorer.exe 232 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4388 wrote to memory of 232 4388 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 83 PID 4388 wrote to memory of 232 4388 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 83 PID 4388 wrote to memory of 232 4388 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 83 PID 232 wrote to memory of 4852 232 explorer.exe 84 PID 232 wrote to memory of 4852 232 explorer.exe 84 PID 232 wrote to memory of 4852 232 explorer.exe 84 PID 4852 wrote to memory of 5056 4852 spoolsv.exe 85 PID 4852 wrote to memory of 5056 4852 spoolsv.exe 85 PID 4852 wrote to memory of 5056 4852 spoolsv.exe 85 PID 5056 wrote to memory of 3152 5056 svchost.exe 86 PID 5056 wrote to memory of 3152 5056 svchost.exe 86 PID 5056 wrote to memory of 3152 5056 svchost.exe 86 PID 5056 wrote to memory of 1972 5056 svchost.exe 87 PID 5056 wrote to memory of 1972 5056 svchost.exe 87 PID 5056 wrote to memory of 1972 5056 svchost.exe 87 PID 5056 wrote to memory of 532 5056 svchost.exe 105 PID 5056 wrote to memory of 532 5056 svchost.exe 105 PID 5056 wrote to memory of 532 5056 svchost.exe 105 PID 5056 wrote to memory of 2860 5056 svchost.exe 114 PID 5056 wrote to memory of 2860 5056 svchost.exe 114 PID 5056 wrote to memory of 2860 5056 svchost.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:232 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3152
-
-
C:\Windows\SysWOW64\at.exeat 08:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1972
-
-
C:\Windows\SysWOW64\at.exeat 08:23 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:532
-
-
C:\Windows\SysWOW64\at.exeat 08:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5b6ac75a8977e4d3dcf7cc007ecbd4516
SHA129b960d1b7d390c75cc1fdd3e74f3785f15aa510
SHA256f3a2f5d999b29fc66437ed0c18413c5d65bfe42979502439edc4f12916fb5d4a
SHA512539de9b20f48a91e5fb10ec89b6e8bcf10066c8bd455e391df97bed54324876d6661d9fc91601a95568b6b369fb3b46d7e32be2556705f0f98072866dbd55c91
-
Filesize
66KB
MD5d6b1902fc528ee983384704dcb1eb8a1
SHA126cec7c7db77663eda401b93b8310b863283bd36
SHA256f1ecbb66d368a1eb8790c6a4982aae7bd3404231f5774fedfa885bc2db62ffc7
SHA51295b1df2d8dbb76a21446b0a019ee3ff3c1da52423274e6fadf4b679af4b54decc8ca99e40112e661891fbadaec25c483f7ac6349dcab2e280eb820b4d94eb408
-
Filesize
66KB
MD594fa8d99fc1198d9710b19d3a4fa4bff
SHA1aa2791b97b2dd4c73749a68663a6871687bf397a
SHA2565042fc8462709adec86b5c0ef8d23bcbe1344cd2141d2661c21ba6525f0bddb2
SHA512e3b6117ace383f8d5bd89f85303e001e83c2be59b07ee224a6ea79f7758fd92e24ec66c6746e0b1cee6c6979ee72a0e7cc4feff4f2266eb7282ce77c1b046e96
-
Filesize
66KB
MD5dd151438ba3da82a5b3d35c7ac818bc5
SHA1f1032b962b68a079c7daaf1bc202544222ae0b3d
SHA256029f884eef0ff22ec5797947337d458f51ae0b078990a5f9bc003ff32cb27323
SHA512a5949741f14dce67c9f7a1931c24bdb6d0e7f0ee0db33c1762a95bd9ca2b3bc7b8b4846baabe0d2a301e4d9f4b9ac9a6a402e04fd192b3a00716fcb2d2baa9e4