Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe
-
Size
224KB
-
MD5
46671b8c2835cfcd4eb2bf83f3f7d4a0
-
SHA1
8d8364460bcff84e32a9ead55be251b65b628ad2
-
SHA256
f15148c30cf48abc24bdd03f6724b8ffc88b30463277367fdb9b85b4a3203c62
-
SHA512
7a4d9b18a6b506f8b75999a43fd429fb6560de8fd240293c38bb9b084c1088868888b91d6188e1cbbc96638c6818f3a262dfc2bb1a929482cf6b16bf79b10199
-
SSDEEP
3072:PvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6uoyVPHSw3u/:PvEN2U+T6i5LirrllHy4HUcMQY6YVP38
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1644 explorer.exe 5076 spoolsv.exe 1372 svchost.exe 1724 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2920 46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe 2920 46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe 1644 explorer.exe 1644 explorer.exe 1372 svchost.exe 1372 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1644 explorer.exe 1372 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2920 46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe 2920 46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe 1644 explorer.exe 1644 explorer.exe 5076 spoolsv.exe 5076 spoolsv.exe 1372 svchost.exe 1372 svchost.exe 1724 spoolsv.exe 1724 spoolsv.exe 1644 explorer.exe 1644 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2920 wrote to memory of 1644 2920 46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe 81 PID 2920 wrote to memory of 1644 2920 46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe 81 PID 2920 wrote to memory of 1644 2920 46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe 81 PID 1644 wrote to memory of 5076 1644 explorer.exe 82 PID 1644 wrote to memory of 5076 1644 explorer.exe 82 PID 1644 wrote to memory of 5076 1644 explorer.exe 82 PID 5076 wrote to memory of 1372 5076 spoolsv.exe 83 PID 5076 wrote to memory of 1372 5076 spoolsv.exe 83 PID 5076 wrote to memory of 1372 5076 spoolsv.exe 83 PID 1372 wrote to memory of 1724 1372 svchost.exe 84 PID 1372 wrote to memory of 1724 1372 svchost.exe 84 PID 1372 wrote to memory of 1724 1372 svchost.exe 84 PID 1372 wrote to memory of 4228 1372 svchost.exe 86 PID 1372 wrote to memory of 4228 1372 svchost.exe 86 PID 1372 wrote to memory of 4228 1372 svchost.exe 86 PID 1372 wrote to memory of 4048 1372 svchost.exe 99 PID 1372 wrote to memory of 4048 1372 svchost.exe 99 PID 1372 wrote to memory of 4048 1372 svchost.exe 99 PID 1372 wrote to memory of 1056 1372 svchost.exe 101 PID 1372 wrote to memory of 1056 1372 svchost.exe 101 PID 1372 wrote to memory of 1056 1372 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\46671b8c2835cfcd4eb2bf83f3f7d4a0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
C:\Windows\SysWOW64\at.exeat 08:44 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4228
-
-
C:\Windows\SysWOW64\at.exeat 08:45 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4048
-
-
C:\Windows\SysWOW64\at.exeat 08:46 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1056
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD53f5038f05d61dd2acf144cd7ee7c62c1
SHA160db04b7716afd259cca1377ee621d2a7c60681d
SHA256ef7be5ce6027b50e575ff676bb085d2717bcf006e81595668d6a9275e7632cce
SHA512450f55fd0d9f00b81a78c0e80087524645bff7a51256d8928fd6eb172853b8765be83208b2c4cafdc793eda1da45438afcd297a1c04c3dec9b0058ac1f622fcb
-
Filesize
224KB
MD5c819fb94a49abc9f8dce3334cd8696c1
SHA1b10918de7871b022e5c0e6184f8b8afc1d1cbcb8
SHA2562aec15d5873a5fc46b659a970b6fcbd0856d472c75922c519b2f1561aee621e3
SHA512af3e360f3d2084a95647b69653cd97e6b11dbb6f16488864dcbb4023f94022b0854ca576a590e68725ceebe079b5906a1afd93141e08784880c5c9f4bfc8ffbe
-
Filesize
224KB
MD539335f4cae0d8c5a3263d94683378284
SHA1122e7d68dde5019ad7c5a368ffe1369f98592f64
SHA256200bae15f39ae3181fc309ec084be6bff8f9f6a569410021db7b89cc22d08a88
SHA51216398803c44d8debb0d0988bc7abd521905c6a9b6dd6513e7e7d015d2e4c05400430893168c1d91c2b5b277af12635ebefab7daf517fb6b9b2cb4eba26b06112
-
Filesize
224KB
MD551c4b122be8a9de151ef819cb610fef2
SHA1509e66de228ec43cb2e9e7f4d61e868d6f51afe9
SHA2565f41f4e1ba801e6e55b6d96c883e75f30f97544a6878f4e622b6559c31141a0e
SHA5121427fbeb9caaf0237ae8a0fbda1349ebbc4bea9734de429384fee3b00f6718772535bd6b7858d2cc490d322b4af77bd5862a258514dd1c7b1efd0da5517d32ad