Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe
-
Size
66KB
-
MD5
256790a9c5b61eac61c88fc946501a50
-
SHA1
65ea5473cdafb9b124eebd780f5f305e4d88303c
-
SHA256
290549df7c08227c1f9f25d25264ba6cb6420200c0277ebb3c3c50b6e1886cbe
-
SHA512
709c473b64384f40b89f5e5bd9c50c624d6dba9dac752ec5e3bf7da42875a50140b5fb13cc872d9a11d4755d18eb44e7b2c1528b86dcdb90b4902b266a6ea853
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXia:IeklMMYJhqezw/pXzH9ia
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2516 explorer.exe 5088 spoolsv.exe 3852 svchost.exe 1152 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4180 256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe 4180 256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe 2516 explorer.exe 2516 explorer.exe 2516 explorer.exe 2516 explorer.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe 2516 explorer.exe 2516 explorer.exe 3852 svchost.exe 3852 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2516 explorer.exe 3852 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4180 256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe 4180 256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe 2516 explorer.exe 2516 explorer.exe 5088 spoolsv.exe 5088 spoolsv.exe 3852 svchost.exe 3852 svchost.exe 1152 spoolsv.exe 1152 spoolsv.exe 2516 explorer.exe 2516 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4180 wrote to memory of 2516 4180 256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe 83 PID 4180 wrote to memory of 2516 4180 256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe 83 PID 4180 wrote to memory of 2516 4180 256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe 83 PID 2516 wrote to memory of 5088 2516 explorer.exe 85 PID 2516 wrote to memory of 5088 2516 explorer.exe 85 PID 2516 wrote to memory of 5088 2516 explorer.exe 85 PID 5088 wrote to memory of 3852 5088 spoolsv.exe 86 PID 5088 wrote to memory of 3852 5088 spoolsv.exe 86 PID 5088 wrote to memory of 3852 5088 spoolsv.exe 86 PID 3852 wrote to memory of 1152 3852 svchost.exe 88 PID 3852 wrote to memory of 1152 3852 svchost.exe 88 PID 3852 wrote to memory of 1152 3852 svchost.exe 88 PID 3852 wrote to memory of 3724 3852 svchost.exe 89 PID 3852 wrote to memory of 3724 3852 svchost.exe 89 PID 3852 wrote to memory of 3724 3852 svchost.exe 89 PID 3852 wrote to memory of 3976 3852 svchost.exe 98 PID 3852 wrote to memory of 3976 3852 svchost.exe 98 PID 3852 wrote to memory of 3976 3852 svchost.exe 98 PID 3852 wrote to memory of 4732 3852 svchost.exe 100 PID 3852 wrote to memory of 4732 3852 svchost.exe 100 PID 3852 wrote to memory of 4732 3852 svchost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\256790a9c5b61eac61c88fc946501a50_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3852 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152
-
-
C:\Windows\SysWOW64\at.exeat 03:04 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3724
-
-
C:\Windows\SysWOW64\at.exeat 03:05 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3976
-
-
C:\Windows\SysWOW64\at.exeat 03:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4732
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD515e98da64aecbd6534c452d8b4c97091
SHA1015fbb5461543645d1d32670505560ef81099a6f
SHA256b7bc3412171e5a42299c87904fb272d9da8740e4d1cda68f8b9c5304eb8ad22f
SHA5128abb0c7e6b5fddb4f9c7e360a5e9f24bc7e85fc0fba4641afa357fbc74d48adb65cab7e850af2fbda9a8c39c6cf3f2382eb3bc84fb35d968ec0d2969ebaa3156
-
Filesize
66KB
MD5c6d9d17cf20027c5b548c759a7d0148f
SHA1b14d5c80bd58301bfd9cc54d9e0f4a0a8871cc2e
SHA25616d1dcecfdb7a8e15308497a8d615a6e37c9eadd216a745a4a05c887519cc62e
SHA512fc4ed9522b3976770a4dfb30767ba31ec62f799fb083fbc485af3c83aede2b41310520a691d8e528db79c1d21e078009ea06d96c44729d532551f7ccef7dbc5e
-
Filesize
66KB
MD53d7df79732577c7d80eb979c00048ee7
SHA1886ad3aefe555e9de25a89083207ac42dce9bac0
SHA256c47e74ee54ff9e0c385afb239476d5f783b0c89cc2813c2328f52ca005b34ac9
SHA512bb04d8d1f687ab3cd4da984285b1b972f9832903602aa696d328875dc131509b041cb3aed4f2b64f3e4579d24c14b0ed7c81a8d8ab822be44fe2bdcd3a2c886b
-
Filesize
66KB
MD597bfb25916b157e6cf3a45373af9d593
SHA1dfd6b9b4377e6a873b0f7c0f223b3dd0f11cc607
SHA2568fc88d5800e68340a268b083874d7265439d8ffe585d823392e921f3a3e809fd
SHA5125604b93879435fdd2e5fa4691bf18cd712569150eae179e226a0ddd23ae10716e377288bbf1c8d031561883f8eee391d363250f33a1fd7324ff627abf280ef6f