Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
8ba8bc24fe636bc8628916141ace6a50
-
SHA1
51d0db8f23bcc5ee52df9cbcd13f7c0c0faf5abf
-
SHA256
fbac1e611cf7aa32ebb631902a3d10d84b2f7b25921466b5b6c87c57f0ce050f
-
SHA512
7fa6ac2f4b89ce734ef5a260a2bf37045d68d5149374972b9d50b31a1851de210daa53c2958f60a691e45f4faf519414aa5fe2e3f3bbff0fcdcc401c571cf996
-
SSDEEP
24576:xLILY8Xu/3y8UsG2BgYLicwnkCsCHdebUKyZURQ1TgjTe:mYrC8UsGuTweCHdeQKyZURQ1EjTe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mls = "\"C:\\Users\\Admin\\AppData\\Roaming\\RAC\\mls.exe\" -s" 8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings 8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3624 WINWORD.EXE 3624 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3624 WINWORD.EXE 3624 WINWORD.EXE 3624 WINWORD.EXE 3624 WINWORD.EXE 3624 WINWORD.EXE 3624 WINWORD.EXE 3624 WINWORD.EXE 3624 WINWORD.EXE 3624 WINWORD.EXE 3624 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 648 wrote to memory of 3624 648 8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe 83 PID 648 wrote to memory of 3624 648 8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8ba8bc24fe636bc8628916141ace6a50_NeikiAnalytics.docx" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD58ba8bc24fe636bc8628916141ace6a50
SHA151d0db8f23bcc5ee52df9cbcd13f7c0c0faf5abf
SHA256fbac1e611cf7aa32ebb631902a3d10d84b2f7b25921466b5b6c87c57f0ce050f
SHA5127fa6ac2f4b89ce734ef5a260a2bf37045d68d5149374972b9d50b31a1851de210daa53c2958f60a691e45f4faf519414aa5fe2e3f3bbff0fcdcc401c571cf996
-
Filesize
16KB
MD5a1bce92d0cb3b74dcb5d5f4b75e4a0d4
SHA1381bc0dccaf198454b861a65d3f6872b6a7daefa
SHA2561bdc571b68623d43e9d5db890907570a470fc160f7d6d6d9c0140016c8df805e
SHA512456d3522af6c87c8b11ef0033bc479434f6c9ae5ea3d3286f9b6e09f938c4cd6834d38ab973a9379c58cde7de396d3207c71b2e3b860029ba5510056c9b2d8dd
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84