Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe
-
Size
615KB
-
MD5
3784d2644d0bd43ba58a1f0338bec260
-
SHA1
325d7de0c5342ae68d5903c4656eb2d96e884d01
-
SHA256
379ff58115070444a238c585d173af33d2b615dbba46f03ff5745e13bf6bd2d0
-
SHA512
ab53357273ac36cddd95e416538fbd81c7e506bed0d1f7acb81cc176019652501a9e357f037067ff42d741514c8ab3d1284cbdcbfbb60a4995f6ae24ebe6f5bc
-
SSDEEP
12288:wlbX+Waplw9U+qMi8CtdVldusIh6BBHCHrKZXCktSzIzWpX5a:WbX+NYTqMi8CtBd2QHCHmTBW5a
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1272 MSWDM.EXE 1184 MSWDM.EXE 2700 3784D2644D0BD43BA58A1F0338BEC260_NEIKIANALYTICS.EXE 1136 Process not Found 2568 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 1272 MSWDM.EXE 1272 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe File opened for modification C:\Windows\devF4C.tmp 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe File opened for modification C:\Windows\devF4C.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1272 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1184 2008 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe 28 PID 2008 wrote to memory of 1184 2008 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe 28 PID 2008 wrote to memory of 1184 2008 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe 28 PID 2008 wrote to memory of 1184 2008 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe 28 PID 2008 wrote to memory of 1272 2008 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe 29 PID 2008 wrote to memory of 1272 2008 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe 29 PID 2008 wrote to memory of 1272 2008 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe 29 PID 2008 wrote to memory of 1272 2008 3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe 29 PID 1272 wrote to memory of 2700 1272 MSWDM.EXE 30 PID 1272 wrote to memory of 2700 1272 MSWDM.EXE 30 PID 1272 wrote to memory of 2700 1272 MSWDM.EXE 30 PID 1272 wrote to memory of 2700 1272 MSWDM.EXE 30 PID 1272 wrote to memory of 2568 1272 MSWDM.EXE 31 PID 1272 wrote to memory of 2568 1272 MSWDM.EXE 31 PID 1272 wrote to memory of 2568 1272 MSWDM.EXE 31 PID 1272 wrote to memory of 2568 1272 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1184
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devF4C.tmp!C:\Users\Admin\AppData\Local\Temp\3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\3784D2644D0BD43BA58A1F0338BEC260_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2700
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devF4C.tmp!C:\Users\Admin\AppData\Local\Temp\3784D2644D0BD43BA58A1F0338BEC260_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD523be70a89b2aea54e60027d594e81043
SHA17c6fa63e71a6481bfecf908d4e782d1a0221571f
SHA256ad6feac659aa18827d8642c142f05cc2f3f9a5f8a7446fe13a1e9dc38415c67d
SHA51214909da39a09277b0306c3f65a44b9655a35bb768da3a862f4eed7e9cdc68840ef40bbcac5c5e39444efe6771a6bc6c74ba39679aeb1d396ab583e5d8bccba3e
-
Filesize
47KB
MD5336ffd74e5eb29bc13e4e0f5de0cb57a
SHA1fb3bab77482267f8880cd329d926a41d397d072d
SHA256688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79
SHA512e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76
-
Filesize
568KB
MD504fb3ae7f05c8bc333125972ba907398
SHA1df22612647e9404a515d48ebad490349685250de
SHA2562fb898bacb587f2484c9c4aa6da2729079d93d1f923a017bb84beef87bf74fef
SHA51294c164a0b884c939ece30f5038d07b756702998d46786f9f613fbea2eb30bed4bc19a409f347bb4cc565898473b18155d580b453683223beaf30ed4079c251b2