Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
91389187245a78e6a420a1c73d405ff0
-
SHA1
edb9db038f604bdfc6e53f528edee158f58844d5
-
SHA256
575995769c6de77768b0e90534a59d932562703fb72c90ab150bb94171525807
-
SHA512
cc701b19929b48c830de016e921d9bc098376d42b2f48f32ff6d9cce4a10da20a09324dd2dc8bbf741b61bb2df99bd7e708e2b8af70a2c1a16f9874b3853a426
-
SSDEEP
98304:ddByXcdnlLwOrI5Vfeg91hZOhkRpsinjB:ddien+OrFuBR6cB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2544 explorer.exe 2744 spoolsv.exe 2660 svchost.exe 2568 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2544 explorer.exe 2744 spoolsv.exe 2660 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 33 IoCs
pid Process 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2544 explorer.exe 2744 spoolsv.exe 2660 svchost.exe 2568 spoolsv.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 752 schtasks.exe 2368 schtasks.exe 1704 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2660 svchost.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe 2660 svchost.exe 2544 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2544 explorer.exe 2660 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2744 spoolsv.exe 2744 spoolsv.exe 2744 spoolsv.exe 2660 svchost.exe 2660 svchost.exe 2660 svchost.exe 2568 spoolsv.exe 2568 spoolsv.exe 2568 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2544 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2544 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2544 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2544 2872 91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe 28 PID 2544 wrote to memory of 2744 2544 explorer.exe 29 PID 2544 wrote to memory of 2744 2544 explorer.exe 29 PID 2544 wrote to memory of 2744 2544 explorer.exe 29 PID 2544 wrote to memory of 2744 2544 explorer.exe 29 PID 2744 wrote to memory of 2660 2744 spoolsv.exe 30 PID 2744 wrote to memory of 2660 2744 spoolsv.exe 30 PID 2744 wrote to memory of 2660 2744 spoolsv.exe 30 PID 2744 wrote to memory of 2660 2744 spoolsv.exe 30 PID 2660 wrote to memory of 2568 2660 svchost.exe 31 PID 2660 wrote to memory of 2568 2660 svchost.exe 31 PID 2660 wrote to memory of 2568 2660 svchost.exe 31 PID 2660 wrote to memory of 2568 2660 svchost.exe 31 PID 2544 wrote to memory of 2472 2544 explorer.exe 32 PID 2544 wrote to memory of 2472 2544 explorer.exe 32 PID 2544 wrote to memory of 2472 2544 explorer.exe 32 PID 2544 wrote to memory of 2472 2544 explorer.exe 32 PID 2660 wrote to memory of 2368 2660 svchost.exe 33 PID 2660 wrote to memory of 2368 2660 svchost.exe 33 PID 2660 wrote to memory of 2368 2660 svchost.exe 33 PID 2660 wrote to memory of 2368 2660 svchost.exe 33 PID 2660 wrote to memory of 1704 2660 svchost.exe 38 PID 2660 wrote to memory of 1704 2660 svchost.exe 38 PID 2660 wrote to memory of 1704 2660 svchost.exe 38 PID 2660 wrote to memory of 1704 2660 svchost.exe 38 PID 2660 wrote to memory of 752 2660 svchost.exe 40 PID 2660 wrote to memory of 752 2660 svchost.exe 40 PID 2660 wrote to memory of 752 2660 svchost.exe 40 PID 2660 wrote to memory of 752 2660 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\91389187245a78e6a420a1c73d405ff0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 06:45 /f5⤵
- Creates scheduled task(s)
PID:2368
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 06:46 /f5⤵
- Creates scheduled task(s)
PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 06:47 /f5⤵
- Creates scheduled task(s)
PID:752
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2472
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a1ac0d909e5f4c9411bd3b121d9ff8f9
SHA1395e769e4546752de235935f3eac4ee7fd64ada3
SHA2564d500d12480cf676575709f8d61273975f1587d63b1598d23eae7872fa0ac0c9
SHA5129d4d0934ceb89b5699e7636c71eac1f99423995706cbfe8ff3f249e49771a27f613945e473eaa4657cf110c81ce5ee3e21372706207d5befbdb42d1882a9dfd4
-
Filesize
3.6MB
MD52ac97c6959da5fed2fc1cc9004374572
SHA106d6dc92ac5bab97da03f69323161a9e9f145e92
SHA256d2e2b1a5aefb8d3de04326e95f1244e49a768d4cc4c52462f0cbf5c9c70d4cce
SHA512330f58b325241163dcaf2bb712dd69b5c3de9a89d159a40fe8857edb69be76585c9f1837e0b11b8f6e691496f7f8d0085745f61c5cbfc64221b5b3ad032b4e67
-
Filesize
3.6MB
MD527f53ad29ff474f46c2142565027bd2c
SHA15cc3533a8e49947b20d34f3e7e1d0e2ae49c4065
SHA25691fe33daf43a6f0cb702581788a3a7496885350741ed571cfb7a422ea5e21748
SHA5125ed1ea013f65bd421d179b0a04ab0a360b63d439e38760c9e86a096501f0dd380ca4440890114118df7ed0f0098f9b4535b6e9ff72db216db413d47b19cfa07a