Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 04:04
Behavioral task
behavioral1
Sample
08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe
-
Size
2.5MB
-
MD5
08f0ca296a36d78eadbdb55db08a4a60
-
SHA1
df2acd69d9a24ca2e7aa9adf6244b9d4fb4a86e7
-
SHA256
d53980dafb91f586ff96100ad0eaa128f47a7e9cfdeb35c687a5f1678e21a262
-
SHA512
a8c70a578e9bcdf69c1fab1fda96983099a9d86f97957a1134aac1cf9e3507ef267179ad5a9207f46d6d152738f6e381ed869dd98183c0d6e1a660356400a1d2
-
SSDEEP
49152:PxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxW:Pxx9NUFkQx753uWuCyyxW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2064 explorer.exe 4744 spoolsv.exe 2552 svchost.exe 3772 spoolsv.exe -
resource yara_rule behavioral2/memory/4772-0-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/files/0x00080000000233ed-9.dat themida behavioral2/memory/2064-10-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/files/0x00090000000233ea-15.dat themida behavioral2/memory/4744-19-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/files/0x00080000000233f1-26.dat themida behavioral2/memory/2552-28-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/3772-33-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/4744-39-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/3772-38-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/4772-41-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/2064-42-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/2552-43-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/2064-48-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/2064-54-0x0000000000400000-0x0000000000A0E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 2064 explorer.exe 4744 spoolsv.exe 2552 svchost.exe 3772 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe 2064 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2064 explorer.exe 2552 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 2064 explorer.exe 2064 explorer.exe 4744 spoolsv.exe 4744 spoolsv.exe 2552 svchost.exe 2552 svchost.exe 3772 spoolsv.exe 3772 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4772 wrote to memory of 2064 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 81 PID 4772 wrote to memory of 2064 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 81 PID 4772 wrote to memory of 2064 4772 08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe 81 PID 2064 wrote to memory of 4744 2064 explorer.exe 83 PID 2064 wrote to memory of 4744 2064 explorer.exe 83 PID 2064 wrote to memory of 4744 2064 explorer.exe 83 PID 4744 wrote to memory of 2552 4744 spoolsv.exe 85 PID 4744 wrote to memory of 2552 4744 spoolsv.exe 85 PID 4744 wrote to memory of 2552 4744 spoolsv.exe 85 PID 2552 wrote to memory of 3772 2552 svchost.exe 86 PID 2552 wrote to memory of 3772 2552 svchost.exe 86 PID 2552 wrote to memory of 3772 2552 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\08f0ca296a36d78eadbdb55db08a4a60_NeikiAnalytics.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3772
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD56f0595c7e81d0a31bda831f42f38153d
SHA10b8d0503e5316c829e026fd6b079afdc335c2a6c
SHA2562ddc6035caf5e87f8c7260dc47856c395956d4dfd9b65af3b1947a2410e3a8d7
SHA5121b3fef0d57f6f2d448c24514904fa2a59018a5d1ea0e9db9e39e74885442fd45e7aa31b90096ec62abc7f5b61c4f8ad319dccc37214cc6d29192f2c48d98881a
-
Filesize
2.5MB
MD569c24f30deeca6a1407a9661bcf35d86
SHA1398ebe3316172012a4b31d740e4bde46f77153aa
SHA256853196cce59b8fd8aef5d7933760289f0aa0482233aeb57d609af6d9527f2ab5
SHA51262444976f528bb362028a4ac316c7203eac8554e8eb4a24e88d304900bb418d6694c681e93000c6fb472446e126f2b21f18398633cc56628c51eeefa17af1f12
-
Filesize
2.5MB
MD5c43fcb705146e39f1461b2538cb7f234
SHA16c2d1de7874f0c17215ad1fc92c83326cf2a1df4
SHA256a0c4d86b676c21279039cb26f9d102374bd8de50e8b0c60e6818deb654a0a3e9
SHA5127f7f499c61970c002ca17bf4cceb14f8aff5d2e6ed70b0b1b5cf98b0749ee08ab788af9845b3cf661c55999bce98b48654ff9dde2b941d568251362f0359e247