Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 22:48
Behavioral task
behavioral1
Sample
0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe
-
Size
134KB
-
MD5
5dce86e44077a9508802e521a24ef3c0
-
SHA1
58fa21f770a339d52f87803d71f26bb7556e1276
-
SHA256
0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68
-
SHA512
719fc2dc6c4fb931adfd707dbc6ab65dbe277931f29029a10da11bd07c9595a6ebbebe0aadc475e2eeeb3534cfa1c1c06dc848099504a1dcfb6a3e8f89d2b61a
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOl:YfU/WF6QMauSuiWNi9eNOl0007NZIOl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 320 wuauclt.exe -
resource yara_rule behavioral2/memory/228-0-0x0000000000020000-0x0000000000048000-memory.dmp upx behavioral2/files/0x0008000000023581-3.dat upx behavioral2/memory/320-4-0x00000000001B0000-0x00000000001D8000-memory.dmp upx behavioral2/memory/228-6-0x0000000000020000-0x0000000000048000-memory.dmp upx behavioral2/memory/320-7-0x00000000001B0000-0x00000000001D8000-memory.dmp upx behavioral2/memory/228-8-0x0000000000020000-0x0000000000048000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 228 wrote to memory of 320 228 0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe 83 PID 228 wrote to memory of 320 228 0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe 83 PID 228 wrote to memory of 320 228 0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe 83 PID 228 wrote to memory of 2008 228 0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe 97 PID 228 wrote to memory of 2008 228 0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe 97 PID 228 wrote to memory of 2008 228 0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:320
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\0d1b7d92fa1a053c6c476d68a6f97509a8263408a0ec70a71f53fe62a5c94f68_NeikiAnalytics.exe" >> NUL2⤵PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD58c2a3f6aa7eb6b52b832b88e9b086192
SHA178186fd116b606eb74d3574142c14ba0b25ab3e3
SHA2568c88a19700e85e0b52558d981330593c533427b121e1e81125e62fd10e684158
SHA51264bb39de0e5c4c77cc823bd81f28383bc578257de5ae45aee0ab864c91421d3dc58016d09e9c70d18cf360bd2203fa28b19d7034e70803904157c631a652ddc3