Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
78bdcfdbda2c9a32ec0e685021e549e0
-
SHA1
9d6638d6aebf904cc7621840afc2eec02a45ee8d
-
SHA256
44c5c8323c82964dce436e828dcb66d1c054b4c7cbba2dee147090e4313fccfb
-
SHA512
8b5d8df9206dee8143796b5beb2457ae0f5e80864af71c90d9693c35e81e13993858101a162d414b133443feb06886070275370dc7534c8c26bdc583b4bdbc2a
-
SSDEEP
24576:wvj+cktriK2PVboYTicnT1SBb//wDKULTrhSFkOTu+FMz:waSPVboYTVABjRGtSFruNz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2856 explorer.exe 1980 spoolsv.exe 2000 svchost.exe 4616 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 34 IoCs
pid Process 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 2856 explorer.exe 1980 spoolsv.exe 2000 svchost.exe 4616 spoolsv.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe 2856 explorer.exe 2000 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2856 explorer.exe 2000 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 2856 explorer.exe 2856 explorer.exe 2856 explorer.exe 1980 spoolsv.exe 1980 spoolsv.exe 1980 spoolsv.exe 2000 svchost.exe 2000 svchost.exe 2000 svchost.exe 4616 spoolsv.exe 4616 spoolsv.exe 4616 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2856 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 82 PID 4636 wrote to memory of 2856 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 82 PID 4636 wrote to memory of 2856 4636 78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe 82 PID 2856 wrote to memory of 1980 2856 explorer.exe 84 PID 2856 wrote to memory of 1980 2856 explorer.exe 84 PID 2856 wrote to memory of 1980 2856 explorer.exe 84 PID 1980 wrote to memory of 2000 1980 spoolsv.exe 86 PID 1980 wrote to memory of 2000 1980 spoolsv.exe 86 PID 1980 wrote to memory of 2000 1980 spoolsv.exe 86 PID 2000 wrote to memory of 4616 2000 svchost.exe 88 PID 2000 wrote to memory of 4616 2000 svchost.exe 88 PID 2000 wrote to memory of 4616 2000 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\78bdcfdbda2c9a32ec0e685021e549e0_NeikiAnalytics.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50fb571c4e40ea4511008e6d7603e24f2
SHA1feae722b9be4979c72f67be6e4b233d1d1adc68c
SHA256163c51e74d787c70e409304a3a019f430f6fe754bbcde2712fd7ee82df9b4edf
SHA51246bc07f6f43bff442880c8bed87ece81a667e305481801cd7afd559514cc057bcae8f5e2805442853c9cb1b463e10fc3dc442a6e05e17635994eb371ea5dfd00
-
Filesize
1.2MB
MD50fb1135fec94fb31481f36cd9a8a418f
SHA19e0e2f0f03dd79de2417f9864c025366110bc90d
SHA2561644905dfdc660f66791a17dee32ffd121f4854baf34bae480c9429d9a33a32e
SHA51241e2cefa7036397860f9fced55076bf4a48ce87803a625720d2a01798a1e935835d6b886ed967a7b1e7b9d43f6717beb63d0232a63e97b7fa91141841cbff7b6
-
Filesize
1.2MB
MD5a5092c35b6c717fa30f8dc9bdde7c051
SHA12613d5f19edfe4dc067c03fb46ffcbc26cf9c269
SHA256fdb9028ddaa79708db7c8320f4a1d7979468a8d94d8b67df1481ba9ac09e0ce8
SHA512274352c070e1a00350a081d49fcb9ec3578ed20571b36e18838edf9252d14850a6f8c6bcf5a2728cab467ec99ec74059cbd1f4c4ff57c1edf6628ffd7c9145a3