Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe
-
Size
3.7MB
-
MD5
936f370ea30246c1cb165a2f0d7fa0e0
-
SHA1
c574b5c7a2a62cf46c9c858baba96b5c80bfd116
-
SHA256
4f2800a2203fd748bed3bcc1286a2476e0ce7fe6957d148b8490bcc818ac7ecb
-
SHA512
b8338ed098fe15b8dbf4d465de636d3f490a1a469bcd50e136611f1393156c815bb328ccc4a39d36c151b9c9bf5db8f05daf7d21927e61b7c2605b10baea3dd1
-
SSDEEP
6144:F76vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvl:F2
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" msng.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4156 msng.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" msng.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: msng.exe File opened (read-only) \??\b: msng.exe File opened (read-only) \??\e: msng.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32.exe 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\rundII32.exe msng.exe File opened for modification C:\Windows\SysWOW64\rundII32.exe msng.exe File created C:\Windows\SysWOW64\rundll32.exe msng.exe File created C:\Windows\SysWOW64\msng.exe 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msng.exe 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\rundII32.exe 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e00310000000000c158043f100054656d7000003a0009000400efbea8582d61c158043f2e00000087e10100000001000000000000000000000000000000eb40ca00540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7800310000000000a8582d611100557365727300640009000400efbe874f7748c158043f2e000000c70500000000010000000000000000003a00000000005423290055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 5000310000000000a858036b100041646d696e003c0009000400efbea8582d61c158043f2e00000068e10100000001000000000000000000000000000000cd464700410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 5000310000000000a8586c6310004c6f63616c003c0009000400efbea8582d61c158043f2e00000086e1010000000100000000000000000000000000000041ade9004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = a800310000000000c158043f10003933364633377e310000900009000400efbec158043fc158043f2e00000000340200000008000000000000000000000000000000eb40ca00390033003600660033003700300065006100330030003200340036006300310063006200310036003500610032006600300064003700660061003000650030005f004e00650069006b00690041006e0061006c0079007400690063007300000018000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 5600310000000000a8582d6112004170704461746100400009000400efbea8582d61c158043f2e00000073e10100000001000000000000000000000000000000e07118004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4156 msng.exe 4156 msng.exe 3632 msedge.exe 3632 msedge.exe 4156 msng.exe 4156 msng.exe 5012 msedge.exe 5012 msedge.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 3148 identity_helper.exe 3148 identity_helper.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe 4156 msng.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4156 msng.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1332 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe 4156 msng.exe 4884 explorer.exe 4884 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2116 1332 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe 82 PID 1332 wrote to memory of 2116 1332 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe 82 PID 1332 wrote to memory of 2116 1332 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe 82 PID 1332 wrote to memory of 4156 1332 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe 83 PID 1332 wrote to memory of 4156 1332 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe 83 PID 1332 wrote to memory of 4156 1332 936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe 83 PID 4156 wrote to memory of 3984 4156 msng.exe 85 PID 4156 wrote to memory of 3984 4156 msng.exe 85 PID 4156 wrote to memory of 3984 4156 msng.exe 85 PID 60 wrote to memory of 5012 60 explorer.exe 87 PID 60 wrote to memory of 5012 60 explorer.exe 87 PID 5012 wrote to memory of 3844 5012 msedge.exe 89 PID 5012 wrote to memory of 3844 5012 msedge.exe 89 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 4712 5012 msedge.exe 90 PID 5012 wrote to memory of 3632 5012 msedge.exe 91 PID 5012 wrote to memory of 3632 5012 msedge.exe 91 PID 5012 wrote to memory of 676 5012 msedge.exe 92 PID 5012 wrote to memory of 676 5012 msedge.exe 92 PID 5012 wrote to memory of 676 5012 msedge.exe 92 PID 5012 wrote to memory of 676 5012 msedge.exe 92 PID 5012 wrote to memory of 676 5012 msedge.exe 92 PID 5012 wrote to memory of 676 5012 msedge.exe 92 PID 5012 wrote to memory of 676 5012 msedge.exe 92 PID 5012 wrote to memory of 676 5012 msedge.exe 92 PID 5012 wrote to memory of 676 5012 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\936f370ea30246c1cb165a2f0d7fa0e0_NeikiAnalytics2⤵PID:2116
-
-
C:\Windows\SysWOW64\msng.exe"C:\Windows\system32\msng.exe" fuckystart2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.OpenClose.ir3⤵PID:3984
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4884
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.openclose.ir/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefa4946f8,0x7ffefa494708,0x7ffefa4947183⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:23⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:13⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:13⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:83⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:13⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:13⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:13⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:13⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1848 /prefetch:13⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:13⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12029975628506828663,5508362413389436544,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:23⤵PID:3464
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
5KB
MD50e3e59127a5d0eef4c13611afb39163f
SHA16537b197866ab927d880d68c70e2b2ae1d56c21f
SHA2565b778333dbd56e457063d08f9aa42e055c5940d0f5ad0a1fbb2eaf604e9811e7
SHA51234a3b725241dc0854e6946e89e8e594697b9f63b73781e8ee5340e5461d38fdc46b532b6b6953bf3b9c932ee0f33c85e8f61a7b6fe244eec049e24067f1e68f0
-
Filesize
6KB
MD591555f1c241fe2f7948bb1adbf914769
SHA1d83d1e0f7b4f60acd4b4be569b3b6681f2086fb9
SHA256c0a190aae1be7dd6733a94ed8c9d24c2a5e808d291a2e7dfb52f12c834c6e0ea
SHA5123b3d9f68c1253d5ace6c25f2d2a1149afc2618c180c900bca4bc37c32c0abf3c4c58a38f5349ae11728178ffdcd83460793973d4502a645ed1fd5cd834d1c2e4
-
Filesize
6KB
MD525c3679d17638e8c9934307ea6d07811
SHA1a54573af802e9217a8cdec1925c1bb12e6a8de5c
SHA2564850416a268fbe39b6522b465ed3eacb0c3e00ad62990c2ee83ced1218cc4660
SHA51201a5fef27020f6c13d5b52a259479c5aa0f2dd23226167fc16ed7d164bac70531395f3f72c444e3dd4330cf025e8b9272e7e0054681aacc542d92af70ce5aae8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53a79dcd0ef07046199b0f480d121c49a
SHA1a9e468db9726ef12e05c43419f5aa1dccc2fa74f
SHA2562392a0f28a195a8524d6275e1e5378b72e7383bd34350d7142fc818355f08cd5
SHA512ae97d3b30bdf70f77a890dd48d27ad410dc4c6b51b6d09b85656a2f4d003bfdb8ffa510294639e4c216638aa700cfc7470d606c9c86391b35bd012737708b0c6
-
Filesize
3.7MB
MD5936f370ea30246c1cb165a2f0d7fa0e0
SHA1c574b5c7a2a62cf46c9c858baba96b5c80bfd116
SHA2564f2800a2203fd748bed3bcc1286a2476e0ce7fe6957d148b8490bcc818ac7ecb
SHA512b8338ed098fe15b8dbf4d465de636d3f490a1a469bcd50e136611f1393156c815bb328ccc4a39d36c151b9c9bf5db8f05daf7d21927e61b7c2605b10baea3dd1
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
83B
MD5a3c8845418fe51afaa72bf0cd9dd5f46
SHA1629dc72dd0a3a3de435e787c4b1a56cc80e28f26
SHA2568fb05fec00bdf9d18215d004479d013d87c30259a4af64008e4367e740bf21f6
SHA512351643a739368002c98bac6f7858169396726f4e995d8613e29af50cd85a45165c04de632b6090da2aaf39e27232fbbbc2bb9ab0590a88148b6b1797820a682e