Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe
-
Size
67KB
-
MD5
1cf436f011a7775e6c04ae1ac46c9890
-
SHA1
52497f5da7648edca087ab927b61c53ec2313949
-
SHA256
05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420
-
SHA512
90bb2f5feccba57383810009cf7d21bc71267ecb76052a047a6648444267e14617a1a1809bf1c68d82ba6e7d79672f8b20d45d9fe2ed44a520abfd38bcb5729e
-
SSDEEP
768:6B7HBXFw82t2C80lyaZ4jX05Rfw/MKPsED3VK2+ZtyOjgO4r9vFAg2rqs4mkesFp:u7HZFwzlyaZTQkKYTjipvF2TZ0F7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4160 cnwog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 452 wrote to memory of 4160 452 05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe 89 PID 452 wrote to memory of 4160 452 05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe 89 PID 452 wrote to memory of 4160 452 05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe 89 PID 4160 wrote to memory of 4968 4160 cnwog.exe 90 PID 4160 wrote to memory of 4968 4160 cnwog.exe 90 PID 4160 wrote to memory of 4968 4160 cnwog.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\cnwog.exe"C:\Users\Admin\AppData\Local\Temp\cnwog.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\cnwog.exe >> NUL3⤵PID:4968
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4168,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=3888 /prefetch:81⤵PID:1332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5e4d53991ebda5b528ad2a05d8183fe5e
SHA1a6ce60cf4afb3f3eea9255dc4a96d5219ee523fc
SHA2568b4ce6a47ae5f62ed4660a6e92ea3ce4411662422280a2d6f6a55ad28c069734
SHA5127fba9a2c262049785e34f933b63334003bc01a99e9caf0e7911a9160ff54a67311e795ade676efbdac59abcfdc8c1cd98cff2a2a3a28f43d3d345fe504668e7f