Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe
-
Size
847KB
-
MD5
1b85353cda186cdc453cfb3757184190
-
SHA1
42d3db77989bef746760c30dcea27486e1f2caf0
-
SHA256
50ea681f7689366f2887e262293b91846581f60370ea510d9202137a74dfafd2
-
SHA512
8dae2f2b14d6038946e85e587b019a8067a4cd19ccbdf880345815f264eff6e2c57082e55da74d223af13cc54aa5efe254c569aaa4b15a1b0dae70669a3be26c
-
SSDEEP
12288:9n8yN0Mr89i6aVs7IypwXK4Qzh+jMlWCEh/NBqa5N7FNX9aGSyXhb:FPu9izIfpwiz0wy/jnDnAGjhb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Isass.exe -
Executes dropped EXE 6 IoCs
pid Process 2532 Isass.exe 1780 Isass.exe 4800 Isass.exe 4980 Isass.exe 1900 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 4224 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 4224 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1328 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 1328 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 2532 Isass.exe 2532 Isass.exe 1780 Isass.exe 1780 Isass.exe 1780 Isass.exe 1780 Isass.exe 1780 Isass.exe 1780 Isass.exe 3372 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 3372 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 4800 Isass.exe 4800 Isass.exe 4800 Isass.exe 4800 Isass.exe 4800 Isass.exe 4800 Isass.exe 1868 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 1868 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 4980 Isass.exe 4980 Isass.exe 4980 Isass.exe 4980 Isass.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2532 1328 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 80 PID 1328 wrote to memory of 2532 1328 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 80 PID 1328 wrote to memory of 2532 1328 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 80 PID 1328 wrote to memory of 1780 1328 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 81 PID 1328 wrote to memory of 1780 1328 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 81 PID 1328 wrote to memory of 1780 1328 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 81 PID 1780 wrote to memory of 3372 1780 Isass.exe 82 PID 1780 wrote to memory of 3372 1780 Isass.exe 82 PID 1780 wrote to memory of 3372 1780 Isass.exe 82 PID 3372 wrote to memory of 4800 3372 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 83 PID 3372 wrote to memory of 4800 3372 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 83 PID 3372 wrote to memory of 4800 3372 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 83 PID 4800 wrote to memory of 1868 4800 Isass.exe 84 PID 4800 wrote to memory of 1868 4800 Isass.exe 84 PID 4800 wrote to memory of 1868 4800 Isass.exe 84 PID 1868 wrote to memory of 4980 1868 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 85 PID 1868 wrote to memory of 4980 1868 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 85 PID 1868 wrote to memory of 4980 1868 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 85 PID 4980 wrote to memory of 1900 4980 Isass.exe 86 PID 4980 wrote to memory of 1900 4980 Isass.exe 86 PID 4980 wrote to memory of 1900 4980 Isass.exe 86 PID 1900 wrote to memory of 4224 1900 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 87 PID 1900 wrote to memory of 4224 1900 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 87 PID 1900 wrote to memory of 4224 1900 1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Temp\{02F5CB69-264C-470E-9DE7-CDE57D10652A}\.cr\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe"C:\Windows\Temp\{02F5CB69-264C-470E-9DE7-CDE57D10652A}\.cr\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1b85353cda186cdc453cfb3757184190_NeikiAnalytics.exe" -burn.filehandle.attached=540 -burn.filehandle.self=5488⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4224
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
675KB
MD501b240ef1a57126468d49d7f3d325e31
SHA1fbf2dea7b5b9ca23d37b1fe2c5942577c5cc78d5
SHA256c42f8342b43b18b811d8f82de0abeecb416b62bf429fc286dc29c2ee044acae5
SHA51212460dccc436c443bbbb48b4544ed03af9a8987bf82c428807a6556ababc73f988baba9d0b2e1ee1854eaefae393e2876946533110e51f0c5a091a6765c3a366
-
Filesize
632KB
MD5c27046bd35c5717084bb40c7305b941a
SHA151510a7753dd2a1236b34b495db21ef18a74c25c
SHA256e0bc82c13bcd1ade084a0421dab88e23e9cc5499323449e585e7dd2116951bd3
SHA512df9dc98043ea5b86c671e769a75e569366223c5a291f5eed22f68af9783a0aa295d8bb0ee0b510767cce7961f2e501124d9fe656044766644e18682f21446214
-
Filesize
211KB
MD53c5d46e4607285341a341a9b7d0130e9
SHA14e695d945d5182fe0a978e0be751ff53e1cf5f28
SHA256eb0982b38075e97295219540d076357fdf241517898e7909a4ab4bb4beed876f
SHA512c1b96b5d981fce255cb843c5cc47ffcc09cd4196bb5b7d47a8429849beeda8c6fb2f6843ac99ba283ad1f1b0efe9f5a02622399134cbc09f94baf63d53a6a21b
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2