Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
0a4a2bdf1520ea368dda567ce423b1f0
-
SHA1
43e8b4b62303f634d578027941d73ddb8850af59
-
SHA256
bc37a8257d3abbce99147ba063fcdd36a635d5a2406218f01d5eaf64485aa659
-
SHA512
b3d2ca5860d76158761e04181aad250d5ebc067aaf3b9bb6591defd6963aa05108f3111f519895da8092dc4ef11042ea2f52ab829b5ecef83650fdb940eebb9f
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiQ:IeklMMYJhqezw/pXzH9iQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3044 explorer.exe 2536 spoolsv.exe 2404 svchost.exe 2400 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1620 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe 1620 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe 3044 explorer.exe 3044 explorer.exe 2536 spoolsv.exe 2536 spoolsv.exe 2404 svchost.exe 2404 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1620 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 2404 svchost.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe 3044 explorer.exe 2404 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3044 explorer.exe 2404 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1620 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe 1620 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe 3044 explorer.exe 3044 explorer.exe 2536 spoolsv.exe 2536 spoolsv.exe 2404 svchost.exe 2404 svchost.exe 2400 spoolsv.exe 2400 spoolsv.exe 3044 explorer.exe 3044 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3044 1620 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe 28 PID 1620 wrote to memory of 3044 1620 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe 28 PID 1620 wrote to memory of 3044 1620 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe 28 PID 1620 wrote to memory of 3044 1620 0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe 28 PID 3044 wrote to memory of 2536 3044 explorer.exe 29 PID 3044 wrote to memory of 2536 3044 explorer.exe 29 PID 3044 wrote to memory of 2536 3044 explorer.exe 29 PID 3044 wrote to memory of 2536 3044 explorer.exe 29 PID 2536 wrote to memory of 2404 2536 spoolsv.exe 30 PID 2536 wrote to memory of 2404 2536 spoolsv.exe 30 PID 2536 wrote to memory of 2404 2536 spoolsv.exe 30 PID 2536 wrote to memory of 2404 2536 spoolsv.exe 30 PID 2404 wrote to memory of 2400 2404 svchost.exe 31 PID 2404 wrote to memory of 2400 2404 svchost.exe 31 PID 2404 wrote to memory of 2400 2404 svchost.exe 31 PID 2404 wrote to memory of 2400 2404 svchost.exe 31 PID 2404 wrote to memory of 2396 2404 svchost.exe 32 PID 2404 wrote to memory of 2396 2404 svchost.exe 32 PID 2404 wrote to memory of 2396 2404 svchost.exe 32 PID 2404 wrote to memory of 2396 2404 svchost.exe 32 PID 2404 wrote to memory of 2940 2404 svchost.exe 36 PID 2404 wrote to memory of 2940 2404 svchost.exe 36 PID 2404 wrote to memory of 2940 2404 svchost.exe 36 PID 2404 wrote to memory of 2940 2404 svchost.exe 36 PID 2404 wrote to memory of 3068 2404 svchost.exe 38 PID 2404 wrote to memory of 3068 2404 svchost.exe 38 PID 2404 wrote to memory of 3068 2404 svchost.exe 38 PID 2404 wrote to memory of 3068 2404 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0a4a2bdf1520ea368dda567ce423b1f0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
C:\Windows\SysWOW64\at.exeat 05:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2396
-
-
C:\Windows\SysWOW64\at.exeat 05:23 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2940
-
-
C:\Windows\SysWOW64\at.exeat 05:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3068
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5f5f30798dd84c1bd2a553f111b4d5451
SHA1536ee4221998576bb59a311f8b3f8a7a66706dcb
SHA256be3347b0f8f0e54f0f9a2919cd05f4f6f1c01144f15823d7ed8e553298f7b8fe
SHA5123a39985adadf9d1530c3503b01b22baa3d87a22aad7407331c6873dde09c7ac550dedd28fd57c73a8485ae8b2fde51204b7162d2ddb0dd9f8ebe3f7f2a47c334
-
Filesize
66KB
MD5c6c27cefa25c85a223d5220de9609f2f
SHA1dcdadc87d314f37d58a5820f4b2ada41bd75a4d6
SHA256eb4c9e262d341c9a36316a05c00394ae06b1c3a9dfa5be0a8fce71cf7f562c6b
SHA512651edfede3db1f0492f95361dec98cd35840bbf1b2bc9978f40cdbec074c3edb4c500e4fea24e653097980d82916e4ec5a93934e3341f3975fff561b9a1f73d2
-
Filesize
66KB
MD5677fc6fe7ef9f43bef1d71572d448c5f
SHA1c0196349e76a1d02d522371dce196b4c146ea18a
SHA256116ec2ef589647f547b1de98ef9692e9a3c057a831afbaaeec32e95415b0a7c3
SHA51230eefdd441dd950a1d49386185f78dce6a679c8419c0586cb17640d1c6b201f09062eb5a7d6abeb9d077fe372c7b3b4eef81e2790cb48f4ed10d1ce033150c7d
-
Filesize
66KB
MD52fe85d8de2094a82d8a6f7d5decf1c27
SHA151e0090d69ee5d9ddc413ff91e19f473c4e5f865
SHA2566e897c3b15a8bd5d0b592c3a11564c6db5649a4006746c3f5f6eb9f6ec64ea2a
SHA51215748febde71ad00d6922dee706c698dce7ffe20f00cadee16b633b1fd53993518678c55fe23d3b918c6896c58bbd6b415ae068a71056fcf2104bec2abf1e7fb