Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe
-
Size
150KB
-
MD5
a218db59526521a9e2e6f5ff3de7a3f0
-
SHA1
572075ecad019a5d89f2808996c5f8a17cc60f45
-
SHA256
ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab
-
SHA512
e0c3e977b4e6d52b58c7115b9b7d76519ee621abd71849777615a640f3fe2c8156a1183b2622153cf187a2ed895883e9d1b5f2561c02260c80deadf5ebaeaf3e
-
SSDEEP
3072:HuuczBGY3j4nLXhfRf70MCRRb85TFcMo7xQGHMOfAVTzXW:HlcEY3iLXXgvRG5TFZoFQaMrHX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4692 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4fa08f68 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4fa08f68 = "C:\\Windows\\apppatch\\svchost.exe" ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe File created C:\Windows\apppatch\svchost.exe ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe 4692 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1388 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 4692 1388 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe 81 PID 1388 wrote to memory of 4692 1388 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe 81 PID 1388 wrote to memory of 4692 1388 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD5f12e2ba96194bdfc343627bd2dc6fd12
SHA1ab3bbf4ba89a29b2139f1e94c88fbdde7f5a67c2
SHA25611597e1bb08a45426cd37a2c90c914f1a81d5d93f15b7c00f574443391b21d17
SHA5128a0da2d9ea72522f10e31b6bae7577807d1f4260479e92c55996a13435036f0474506db786dc5db7976bee4ae4fc185aa2629502ecc51dddccf0d929d5453912