Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 09:00
Behavioral task
behavioral1
Sample
2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe
-
Size
829KB
-
MD5
2d590769f2f8cfd576fb53b8f4120d70
-
SHA1
e252a3b8ae16c466d1eaca26784a6bca7ddf40e1
-
SHA256
5219048e926858dcf8b7b3faa19858a1bb94fd651499be744b01653a21b9a21e
-
SHA512
69e093c9559c8e1b47fc3086ebaceeb47ccd1cb7eaa7fb9f77b4b1a42b23e6c1bc7ba4de664eb34fa63fc9069075f27f4ab41a34d90fcfef990d06e397485a2c
-
SSDEEP
12288:0CUgr2LvIugPRGtpmJ5FtbOSHUDGcYTh6uHY4dxhul49:0CU22rIugP2kJjtbOYjchkL8l49
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3124 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4460 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 932 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3204 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 512 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3716 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5016 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2260 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2564 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4364 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4420 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4920 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3320 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 448 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4852 448 schtasks.exe 81 -
resource yara_rule behavioral2/memory/4480-1-0x0000000000FE0000-0x00000000010B6000-memory.dmp dcrat behavioral2/files/0x00070000000233db-11.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3224 TextInputHost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\WindowsPowerShell\Modules\TextInputHost.exe 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe File created C:\Program Files\WindowsPowerShell\Modules\22eafd247d37c3 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe File created C:\Program Files\Windows Photo Viewer\fontdrvhost.exe 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe File created C:\Program Files\Windows Photo Viewer\5b884080fd4f94 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe File created C:\Program Files\ModifiableWindowsApps\MusNotification.exe 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\security\templates\backgroundTaskHost.exe 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe File opened for modification C:\Windows\security\templates\backgroundTaskHost.exe 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe File created C:\Windows\security\templates\eddb19405b7ce1 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe File created C:\Windows\LiveKernelReports\taskhostw.exe 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe File created C:\Windows\LiveKernelReports\ea9f0e6c9e2dcd 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4364 schtasks.exe 4468 schtasks.exe 1680 schtasks.exe 932 schtasks.exe 1052 schtasks.exe 3204 schtasks.exe 3716 schtasks.exe 2260 schtasks.exe 4852 schtasks.exe 4920 schtasks.exe 3320 schtasks.exe 3124 schtasks.exe 512 schtasks.exe 1300 schtasks.exe 2328 schtasks.exe 2932 schtasks.exe 4420 schtasks.exe 4460 schtasks.exe 5016 schtasks.exe 2564 schtasks.exe 2968 schtasks.exe 1284 schtasks.exe 3676 schtasks.exe 2552 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 3224 TextInputHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe Token: SeDebugPrivilege 3224 TextInputHost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4480 wrote to memory of 3224 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 107 PID 4480 wrote to memory of 3224 4480 2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2d590769f2f8cfd576fb53b8f4120d70_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files\WindowsPowerShell\Modules\TextInputHost.exe"C:\Program Files\WindowsPowerShell\Modules\TextInputHost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Windows\security\templates\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\security\templates\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Windows\security\templates\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\Modules\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Program Files\WindowsPowerShell\Modules\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\Default\SendTo\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default\SendTo\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Default\SendTo\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Photo Viewer\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Windows\LiveKernelReports\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Windows\LiveKernelReports\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
829KB
MD52d590769f2f8cfd576fb53b8f4120d70
SHA1e252a3b8ae16c466d1eaca26784a6bca7ddf40e1
SHA2565219048e926858dcf8b7b3faa19858a1bb94fd651499be744b01653a21b9a21e
SHA51269e093c9559c8e1b47fc3086ebaceeb47ccd1cb7eaa7fb9f77b4b1a42b23e6c1bc7ba4de664eb34fa63fc9069075f27f4ab41a34d90fcfef990d06e397485a2c