Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
2449161e8fa06ccd0b6519d6ff761820_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2449161e8fa06ccd0b6519d6ff761820_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
2449161e8fa06ccd0b6519d6ff761820_NeikiAnalytics.dll
-
Size
500KB
-
MD5
2449161e8fa06ccd0b6519d6ff761820
-
SHA1
55a8ed75679a79175ab528e93912e0e39aa7b044
-
SHA256
ac142a0fb80e50e856e020a3a5f30ec31bb95114b91d75878ed1ff1307d080fb
-
SHA512
a8cf2bc1dddfe35b00477a41fca6b822aa6aded77c38b122e5bbc2ec1a6274eba96183dfd26a6b42ae5190eb06346313b8ef0cd79d64c4795f396217aad962a4
-
SSDEEP
6144:Mi05kH9OyU2uv5SRf/FWgFgt0gqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:nrHGPv5SmptZDmUWuVZkxikdXcq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tyoytnnsf = "\"C:\\Users\\Admin\\AppData\\Roaming\\WA5lIwZ\\tcmsetup.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\7531\AgentService.exe cmd.exe File opened for modification C:\Windows\system32\7531\AgentService.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3264 schtasks.exe -
Modifies registry class 10 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings Process not Found Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings\shell\open\command Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings\shell\open\command\DelegateExecute Process not Found Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\gf01M.cmd" Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3460 Process not Found -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3212 3460 Process not Found 83 PID 3460 wrote to memory of 3212 3460 Process not Found 83 PID 3460 wrote to memory of 744 3460 Process not Found 84 PID 3460 wrote to memory of 744 3460 Process not Found 84 PID 3460 wrote to memory of 4224 3460 Process not Found 85 PID 3460 wrote to memory of 4224 3460 Process not Found 85 PID 3460 wrote to memory of 3612 3460 Process not Found 86 PID 3460 wrote to memory of 3612 3460 Process not Found 86 PID 3460 wrote to memory of 4580 3460 Process not Found 88 PID 3460 wrote to memory of 4580 3460 Process not Found 88 PID 4580 wrote to memory of 1456 4580 cmd.exe 90 PID 4580 wrote to memory of 1456 4580 cmd.exe 90 PID 3460 wrote to memory of 1660 3460 Process not Found 91 PID 3460 wrote to memory of 1660 3460 Process not Found 91 PID 3460 wrote to memory of 4952 3460 Process not Found 92 PID 3460 wrote to memory of 4952 3460 Process not Found 92 PID 3460 wrote to memory of 4916 3460 Process not Found 93 PID 3460 wrote to memory of 4916 3460 Process not Found 93 PID 3460 wrote to memory of 4792 3460 Process not Found 95 PID 3460 wrote to memory of 4792 3460 Process not Found 95 PID 4792 wrote to memory of 840 4792 fodhelper.exe 96 PID 4792 wrote to memory of 840 4792 fodhelper.exe 96 PID 840 wrote to memory of 3264 840 cmd.exe 98 PID 840 wrote to memory of 3264 840 cmd.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2449161e8fa06ccd0b6519d6ff761820_NeikiAnalytics.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
C:\Windows\system32\MicrosoftEdgeCP.exeC:\Windows\system32\MicrosoftEdgeCP.exe1⤵PID:3212
-
C:\Windows\system32\taskhostw.exeC:\Windows\system32\taskhostw.exe1⤵PID:744
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵PID:4224
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\NSV.cmd1⤵PID:3612
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{3a08b51c-18ae-b8b8-79b6-366761e0ad6d}"1⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{3a08b51c-18ae-b8b8-79b6-366761e0ad6d}"2⤵PID:1456
-
-
C:\Windows\system32\odbcconf.exeC:\Windows\system32\odbcconf.exe1⤵PID:1660
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵PID:4952
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\foVrzg.cmd1⤵
- Drops file in System32 directory
PID:4916
-
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\gf01M.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Bjikfkop" /SC minute /MO 60 /TR "C:\Windows\system32\7531\AgentService.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:3264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD54459d6b6d7fc74b1057b276a7523b875
SHA130fecfa13359a44f3ee5238c2762fa95a3cc5bbb
SHA2566a58bc36894903a12dcd4e2759f0ddaf06be9e918330439bd0fca57c5894bad0
SHA5126c78e7b1dbb66ea6629249a55cf1b4822de999f75ad11e7e453bd705859ef5bec0e4ea258e4e2b88a58ff230e70c24f981e388b7106d556768c81caf6a230838
-
Filesize
236B
MD5ca6afa413684cb40b463f01d125e9857
SHA15226c3db6ad640f1e97036234c2b21a7125d7571
SHA2566263bb1e968235d92b66b1d8b121a6c24812e57ada8c3f54c22493024907b6d4
SHA51298bf3f72843cabe08e01caa75800c2760cdbf52bebe05b46d19d28a695e704578df1de6d048b019eb8563c3e48450eb08cef3f4f30fe72f77f9bc7828bb9ee72
-
Filesize
198B
MD53a4af33fae3936c0ace226bad4f1f605
SHA1a11674936d501c2cb53d3db1ef2233e844e6ca10
SHA2569707ae17d1d797928f73fc77c94eb19ffcc8e09d668321df8acfe13ae5d165b4
SHA51250124a2f748aec10d31d45253993b1293ad917c15db75ae51cc9d787d7a89206cdfbfa9e948b7028b5c0d4a09c86dd63ca968f1de1739d564f9d6717bc071849
-
Filesize
131B
MD5ca7306d45ddf2467eb4025c7f8c95232
SHA1fc55757adcf02b0cd4c964b447d30ec218a77ee5
SHA256761e24488a6dd05a16e6481d8228bed5d775a22e29a97769f89346476af5245d
SHA5125192021d998c988ba18a8207634d2336dd510cb02a42dec8492daf7111ca8b8d38e95afbd2677905a4facc797a4aa1e187d1b2fa9fe18dc2b623604af6977081
-
Filesize
508KB
MD54b28a5e6adebdbe34d41e07cdbfbfa11
SHA1d1a0f9f237384cc0491aab85cb35738fd288bf27
SHA2566f136fce4b3b76e41480d24eddf634660dfaf3725616b5f157a14a3539bde43d
SHA5123ac71cd7266ce8c9284afab695a75ae6beb56ea813fa5d26c98a9604daa9f1118a51ed4e9706729e11eb479e06dc75330c7729722eb2404ab856389b2ba9c86c
-
Filesize
914B
MD5b003bebff468be10dccf8bd709882497
SHA1a983a2bed9bbefca38ec2f89cc966957f32e8dab
SHA2563a73740792d2e71600f2f6a8c0f6a1d584b7b33288b7a51e97e750f75bbcb381
SHA5121768dec4b37c3f0206e3d6c699fd73614211bd7223ce3e8efe0dfa5417a7950e4a41047b226d304787c8a3f66b431a922ad2201029583c571a35035f76cf9275
-
Filesize
16KB
MD558f3b915b9ae7d63431772c2616b0945
SHA16346e837da3b0f551becb7cac6d160e3063696e9
SHA256e243501ba2ef7a6f04f51410bb916faffe0ec23450a4d030ce6bfe747e544b39
SHA5127b09192af460c502d1a94989a0d06191c8c7a058ce3a4541e3f45960a1e12529d0cdaff9da3d5bacfdceed57aeb6dc9a159c6c0a95675c438f99bf7e418c6dc5