Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 10:30

General

  • Target

    514721b58189a2cb0132f06b1061f900_NeikiAnalytics.exe

  • Size

    12KB

  • MD5

    514721b58189a2cb0132f06b1061f900

  • SHA1

    2f55a861874e9e32990d9ee8ea86695ece396fa7

  • SHA256

    55f4dcbe3a9fecf82f78ba628fb6375e0e800b7d04bae2bc8f78b220926f5c51

  • SHA512

    f0fd4c584fd83d4442964fd556c383acdf436b790deda81fe5fcc5509c99c7e89995b03fc37e14b2ff74cba520de1e606d1b959dc247eca367b5bc58de2a39f3

  • SSDEEP

    384:XL7li/2zsq2DcEQvdQcJKLTp/NK9xaAY:bYMCQ9cAY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\514721b58189a2cb0132f06b1061f900_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\514721b58189a2cb0132f06b1061f900_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\iedugzqd\iedugzqd.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C47.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD288C4AA22CA416EBE1912016BAE943.TMP"
        3⤵
          PID:556
      • C:\Users\Admin\AppData\Local\Temp\tmp6A44.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp6A44.tmp.exe" C:\Users\Admin\AppData\Local\Temp\514721b58189a2cb0132f06b1061f900_NeikiAnalytics.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        PID:4996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RE.resources

      Filesize

      2KB

      MD5

      ede838db2ac379bcd2187fee5d5ecbea

      SHA1

      8017173caac4d3d8ca120ef72c3208beb21ae8cf

      SHA256

      b2e2c06f1f15f836ef1ddcd79732e672a7da74e486c998b763ca4b6403e9333f

      SHA512

      b676d8dac7a1b0c59d8195a3ec639c6d3f6bc76cd26b4cb7d988d0eb947bcd42923f41e30cc1499ad6fda6a3161817dc7504bbb65a12b3ec4228983aa68eb22a

    • C:\Users\Admin\AppData\Local\Temp\RES6C47.tmp

      Filesize

      1KB

      MD5

      69269eb09d0ceabff42565099075887c

      SHA1

      8282e02a710f7bffc849056f32b5d1fcdcc207a4

      SHA256

      0e53d4c81a22112ea35d51948431ed98b53fbdddb5513820ddb5d24f5d8b1217

      SHA512

      3db6f67556e9b32035bf2e26ea803473a1cc1f936371314e1605ce350bf2410d4947da3ec5f05968dfd7b5cb87461b6513502850d4e335d009ab8c86cb765ad3

    • C:\Users\Admin\AppData\Local\Temp\iedugzqd\iedugzqd.0.vb

      Filesize

      2KB

      MD5

      db0173c1d91c9db87a69697c773a1df8

      SHA1

      b838695f8a8fd45daa6eab89186eb40227a989fc

      SHA256

      2e20ccf5e710946b918d78d78a9ddde1e64949eae485c8d937e019d19a7ec79c

      SHA512

      a5ed0d54ed8f9edfb0b00e4b322dc2388efbf7a6b903ac930bf3682cbd8f27fdc10edb3c9f07855c8c471a64ef67eea12730bd95f9d0bdd921469710d23e431c

    • C:\Users\Admin\AppData\Local\Temp\iedugzqd\iedugzqd.cmdline

      Filesize

      273B

      MD5

      1ef5cfbd6fb2abe4cbfc438d0a8c9071

      SHA1

      8d79314076c0448de52b1884939ccd6c9b2d3f40

      SHA256

      a87868bb39528786edafe8234fdb9866a72144057d7fdf606987ff5f8e36aa72

      SHA512

      1119109a219c1509da71b6fa44055569fdb16156158137aa334d9b5db7d903685f46ba622f5f5edc7e5e5c2dbc9b11af31ae2b00d091a716fd72f8be8f90a52f

    • C:\Users\Admin\AppData\Local\Temp\tmp6A44.tmp.exe

      Filesize

      12KB

      MD5

      40ecd7af94cf00ac1da5f3efcae39030

      SHA1

      8254020b1b689e9bb85298bc6f8ed911dcf82b86

      SHA256

      b7ee237fb12b69c54b4fd9f76e9f69df1544c1be30f214fd2423b45e4a800cdd

      SHA512

      ba31e4ba120e80e09a4f14d9ad9dd389e5dc9e5572f0f0018d789cb586d79089d69f5e52aff03cf7254fc9bf432628862a194522552a212e6fb83bc39fe831d8

    • C:\Users\Admin\AppData\Local\Temp\vbcD288C4AA22CA416EBE1912016BAE943.TMP

      Filesize

      1KB

      MD5

      0a997c14455000c99a040f48d5647355

      SHA1

      be845cd9bb7ba5adf3733c2ff40b33af655a73c5

      SHA256

      4fa74e8d657a7d45328c064e64dda0bf625b9a4364d2eb95549e2b68c287a947

      SHA512

      2b663a6229c5d89dc557178ba82f9cc825b4e4152f5cef71a3e78d6ba78ffaeea279ce8f5d87beac993faf7c65bab7afb248131911a8fcba413178e263900742

    • memory/380-0-0x000000007495E000-0x000000007495F000-memory.dmp

      Filesize

      4KB

    • memory/380-8-0x0000000074950000-0x0000000075100000-memory.dmp

      Filesize

      7.7MB

    • memory/380-2-0x0000000004D00000-0x0000000004D9C000-memory.dmp

      Filesize

      624KB

    • memory/380-1-0x0000000000320000-0x000000000032A000-memory.dmp

      Filesize

      40KB

    • memory/380-24-0x0000000074950000-0x0000000075100000-memory.dmp

      Filesize

      7.7MB

    • memory/4996-25-0x0000000000AF0000-0x0000000000AFA000-memory.dmp

      Filesize

      40KB

    • memory/4996-26-0x0000000074950000-0x0000000075100000-memory.dmp

      Filesize

      7.7MB

    • memory/4996-27-0x0000000005A10000-0x0000000005FB4000-memory.dmp

      Filesize

      5.6MB

    • memory/4996-28-0x0000000005460000-0x00000000054F2000-memory.dmp

      Filesize

      584KB

    • memory/4996-30-0x0000000074950000-0x0000000075100000-memory.dmp

      Filesize

      7.7MB