Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 00:11
Behavioral task
behavioral1
Sample
25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe
-
Size
63KB
-
MD5
f3f0a9a0a22b6949e0e1471f73bdd370
-
SHA1
fceace4920e671e8bfb4fc133830a38becc8147f
-
SHA256
25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98
-
SHA512
7428809f84a617047090e948521dffd1d3c5ffcfd91bb46365e094b5d63252c1a4db182b4893ad2b6f597eb879bcdfc184c526271fb541b0d41975ca09669b75
-
SSDEEP
768:quY6LVcsTPq781wC8A+XjeXgqiudfBSuJwP1+T46SBGHmDbDlph0oXyyzIXSuMdP:DeQPc25j5BnihYUbfh9y0uMdpqKmY7
Malware Config
Extracted
asyncrat
Default
20.ip.gl.ply.gg:42948
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023255-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 544 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4484 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe Token: SeDebugPrivilege 544 svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1860 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 90 PID 2548 wrote to memory of 1860 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 90 PID 2548 wrote to memory of 3880 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 92 PID 2548 wrote to memory of 3880 2548 25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe 92 PID 3880 wrote to memory of 4484 3880 cmd.exe 95 PID 3880 wrote to memory of 4484 3880 cmd.exe 95 PID 1860 wrote to memory of 2916 1860 cmd.exe 94 PID 1860 wrote to memory of 2916 1860 cmd.exe 94 PID 3880 wrote to memory of 544 3880 cmd.exe 96 PID 3880 wrote to memory of 544 3880 cmd.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\25ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp628D.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4484
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4244 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5ca7016e8e4fe526f435da0313d5d1284
SHA1af79adf601d839b4af76fc103fac6d6d9d3bea6c
SHA256b4cde2419898251e136f8b8bb7ead9b5717fa249db7c675f0d36fb012e18b30a
SHA512afad5901894e74cb424abb3a6f2420cb1ddbe94ffa123233c9c51aab2719f133ef8f310eea4fa25b4ab2895184d8fff4f329daa865a31d61feae94c8ad682d3e
-
Filesize
63KB
MD5f3f0a9a0a22b6949e0e1471f73bdd370
SHA1fceace4920e671e8bfb4fc133830a38becc8147f
SHA25625ec5a9efacea3c081951a6ea96f6bf2823faff226eeadaa8ec2c5570ff92f98
SHA5127428809f84a617047090e948521dffd1d3c5ffcfd91bb46365e094b5d63252c1a4db182b4893ad2b6f597eb879bcdfc184c526271fb541b0d41975ca09669b75