Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe
-
Size
232KB
-
MD5
04b80b90cd6db9230749ad60419be210
-
SHA1
093767add842b3b887761a54e283807d28ed9dde
-
SHA256
5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df
-
SHA512
d105edbd71ebf9ae2e7f7e9d2de4c8da9a51b087bd32caa4726b84536db8ed462090dcc45cc3ec422d00e3b444249e5271d7d338fd8a9fd4d6692ec07f663d1e
-
SSDEEP
6144:s1UDRcn5R2C1mZ7qAkklcFcwUZcFAVJKyIfgA/:s1eRC5T1mZ2pkqWVDIfgw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3176 rppmm.exe -
Executes dropped EXE 2 IoCs
pid Process 3176 rppmm.exe 2184 npagehu.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 npagehu.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmap = "c:\\Program Files\\eodgmhqzb\\npagehu.exe \"c:\\Program Files\\eodgmhqzb\\npagehu.dll\",InvCMAP" npagehu.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: npagehu.exe File opened (read-only) \??\i: npagehu.exe File opened (read-only) \??\s: npagehu.exe File opened (read-only) \??\w: npagehu.exe File opened (read-only) \??\j: npagehu.exe File opened (read-only) \??\k: npagehu.exe File opened (read-only) \??\o: npagehu.exe File opened (read-only) \??\p: npagehu.exe File opened (read-only) \??\q: npagehu.exe File opened (read-only) \??\a: npagehu.exe File opened (read-only) \??\g: npagehu.exe File opened (read-only) \??\h: npagehu.exe File opened (read-only) \??\r: npagehu.exe File opened (read-only) \??\v: npagehu.exe File opened (read-only) \??\z: npagehu.exe File opened (read-only) \??\l: npagehu.exe File opened (read-only) \??\n: npagehu.exe File opened (read-only) \??\u: npagehu.exe File opened (read-only) \??\t: npagehu.exe File opened (read-only) \??\x: npagehu.exe File opened (read-only) \??\b: npagehu.exe File opened (read-only) \??\e: npagehu.exe File opened (read-only) \??\m: npagehu.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 npagehu.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification \??\c:\Program Files\eodgmhqzb\npagehu.exe rppmm.exe File opened for modification \??\c:\Program Files\eodgmhqzb rppmm.exe File created \??\c:\Program Files\eodgmhqzb\npagehu.dll rppmm.exe File created \??\c:\Program Files\eodgmhqzb\npagehu.exe rppmm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 npagehu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString npagehu.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3980 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2184 npagehu.exe 2184 npagehu.exe 2184 npagehu.exe 2184 npagehu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 npagehu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2128 5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe 3176 rppmm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2872 2128 5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe 83 PID 2128 wrote to memory of 2872 2128 5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe 83 PID 2128 wrote to memory of 2872 2128 5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe 83 PID 2872 wrote to memory of 3980 2872 cmd.exe 85 PID 2872 wrote to memory of 3980 2872 cmd.exe 85 PID 2872 wrote to memory of 3980 2872 cmd.exe 85 PID 2872 wrote to memory of 3176 2872 cmd.exe 88 PID 2872 wrote to memory of 3176 2872 cmd.exe 88 PID 2872 wrote to memory of 3176 2872 cmd.exe 88 PID 3176 wrote to memory of 2184 3176 rppmm.exe 89 PID 3176 wrote to memory of 2184 3176 rppmm.exe 89 PID 3176 wrote to memory of 2184 3176 rppmm.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\rppmm.exe "C:\Users\Admin\AppData\Local\Temp\5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\rppmm.exeC:\Users\Admin\AppData\Local\Temp\\rppmm.exe "C:\Users\Admin\AppData\Local\Temp\5b5898dc23b7c45b78d7bac580372c96fd034784681d154ad840a103c4c482df_NeikiAnalytics.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
\??\c:\Program Files\eodgmhqzb\npagehu.exe"c:\Program Files\eodgmhqzb\npagehu.exe" "c:\Program Files\eodgmhqzb\npagehu.dll",InvCMAP C:\Users\Admin\AppData\Local\Temp\rppmm.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5760a1f9815fd8fc8e0163681e9d6018e
SHA18ba3069210d13caf792873c4583cb07884b73d0e
SHA2567444096c95217933e77bef864cd6cb978ff9301db89652060013f6ed04c1380d
SHA512bcd7581fd052fa2c94d197d3cd21e4272b263424c598886412c3571d0548fb482087701ce1929deeef4f30756f8e536ba2733d2887f8481a633863416993b561
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
232KB
MD5033a58a4047fe4d33a2616b6bdc72e20
SHA1dcaff47f408ed4b2824f9db16bb74b271699d8f8
SHA2565ff6a386f8b12c414480efedd618879d77bb27708d38881a466679695be78698
SHA51258758674521bdb9f9f1f864109cbfa3d3f7107dcbb3a9c1840fbfd079b65f24ec0bb4d54c53366d597ebef40bf71b2549a5004fe05da2313994f95ada8435792