Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe
-
Size
65KB
-
MD5
59e05d8c234b2d0f1da1867d33b5c760
-
SHA1
4d491ea435b2d5cdfebfaa3473017adb6b35f725
-
SHA256
660f40e3d538ea675e4114bd7290e1a184f4c91c53b732d8c375a6142a8a105b
-
SHA512
31a58fcdb1fd65b67bab71935b0d8e18d42d2154cdd67323e1613c7a61c5643ecf37964de0ad731ea50846b5e16eb4ce279846ec30329c3fa2fdc788ebe32e30
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuE:7WNqkOJWmo1HpM0MkTUmuE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3464 explorer.exe 2380 spoolsv.exe 4240 svchost.exe 3972 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe 2100 59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe 3464 explorer.exe 3464 explorer.exe 3464 explorer.exe 3464 explorer.exe 3464 explorer.exe 3464 explorer.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 3464 explorer.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 3464 explorer.exe 4240 svchost.exe 3464 explorer.exe 4240 svchost.exe 4240 svchost.exe 3464 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3464 explorer.exe 4240 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2100 59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe 2100 59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe 3464 explorer.exe 3464 explorer.exe 2380 spoolsv.exe 2380 spoolsv.exe 4240 svchost.exe 4240 svchost.exe 3972 spoolsv.exe 3972 spoolsv.exe 3464 explorer.exe 3464 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3464 2100 59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe 83 PID 2100 wrote to memory of 3464 2100 59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe 83 PID 2100 wrote to memory of 3464 2100 59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe 83 PID 3464 wrote to memory of 2380 3464 explorer.exe 84 PID 3464 wrote to memory of 2380 3464 explorer.exe 84 PID 3464 wrote to memory of 2380 3464 explorer.exe 84 PID 2380 wrote to memory of 4240 2380 spoolsv.exe 85 PID 2380 wrote to memory of 4240 2380 spoolsv.exe 85 PID 2380 wrote to memory of 4240 2380 spoolsv.exe 85 PID 4240 wrote to memory of 3972 4240 svchost.exe 87 PID 4240 wrote to memory of 3972 4240 svchost.exe 87 PID 4240 wrote to memory of 3972 4240 svchost.exe 87 PID 4240 wrote to memory of 2904 4240 svchost.exe 88 PID 4240 wrote to memory of 2904 4240 svchost.exe 88 PID 4240 wrote to memory of 2904 4240 svchost.exe 88 PID 4240 wrote to memory of 1952 4240 svchost.exe 102 PID 4240 wrote to memory of 1952 4240 svchost.exe 102 PID 4240 wrote to memory of 1952 4240 svchost.exe 102 PID 4240 wrote to memory of 4628 4240 svchost.exe 113 PID 4240 wrote to memory of 4628 4240 svchost.exe 113 PID 4240 wrote to memory of 4628 4240 svchost.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\59e05d8c234b2d0f1da1867d33b5c760_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3464 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4240 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3972
-
-
C:\Windows\SysWOW64\at.exeat 12:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2904
-
-
C:\Windows\SysWOW64\at.exeat 12:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1952
-
-
C:\Windows\SysWOW64\at.exeat 12:58 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD545ffa6e2b5074e31a035512eb770a0a9
SHA1cd6a79d34fc3f94f5c8de19a3e71d366d33906af
SHA256d2913c94bf87280c7e9e4cb60c141ff3d38088d98ee077cae0d609d3c9740247
SHA512892cbc772ca143b674422f696e4f43c895d8a95bab8152cee8e8753736bf93bb4db4a4b20bc63529178aeaf81a2e3873e035634942f1a0990e9f9452a600b4d9
-
Filesize
65KB
MD5fbd2061e560b7244c44bd8f5c4502130
SHA16304b6c0e6a6445d249d9aeacb5f0107549d4e13
SHA25685e7f3edbe2e33b2d410da4fb8c5d26b57db32f8fda3ea651b4e5304922e9e65
SHA51207df35d5c9f66a169f168d9e211bce30f3b0544a73b1559c6ca649797ad3f9f45b1214d3717a851ad4fa2583041c885d908c482766fd5ab38bd80baf52060260
-
Filesize
65KB
MD52ffdebd81b6ccbb9f884ff462b5c43ea
SHA16b990cf03a58b45c293d07dc37d6ab5a07960dd2
SHA25640b58aab234b7cf7d9c563acea04b6902db55c11ae0cca0166b6f50387232466
SHA5120b29da4a42c7a8653cb7e26a3d2c6a75e8e9321a74e42b3f3b51d07a7e2ec81488b771b362f278255ccb6fce2c7e7df1292468454bc735abe235f92ca34f8f6e
-
Filesize
65KB
MD531c4fadfb1d93441ac47f8a309257547
SHA1255a658cc1a61e354bb2ca5b978fd1b31e3b0377
SHA256c6e8e65e7e0d678d1c0b70c7a00d5c13bc10e24717f57dbcc550e779ae43206a
SHA51255b5c89cdfc59a4baa598cd5989e75a57593930d34d8aedd2014c6e0a3ff2868678f1a10c200a6300b7bb5097270b7bb1e483e9fa1ab4a1bb6efbcbad38eb9a4