Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
190bc55d8b7501b7c3ca523267493fd0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
190bc55d8b7501b7c3ca523267493fd0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
190bc55d8b7501b7c3ca523267493fd0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
190bc55d8b7501b7c3ca523267493fd0
-
SHA1
4191995528036953c4930819fb792e1063970dd9
-
SHA256
3a2ebf5afe0b6c33a36e9bed8b491fbcdf87e5b1b87867f7f804640bfb01b74f
-
SHA512
f1be2dd773aacdb93beeafd2866d20be8c1a8505a40ffcdecd6fa0694c868b212d58b321fccea45d17283d4dca4e1cd7fa9e634dafec5d9d201b34e4f4e50278
-
SSDEEP
1536:zvpoooXM5F0qfhj2ipNOQA8AkqUhMb2nuy5wgIP0CSJ+5yEB8GMGlZ5G:zvpoooE062VGdqU7uy5w9WMyEN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4152 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4252 wrote to memory of 2684 4252 190bc55d8b7501b7c3ca523267493fd0_NeikiAnalytics.exe 84 PID 4252 wrote to memory of 2684 4252 190bc55d8b7501b7c3ca523267493fd0_NeikiAnalytics.exe 84 PID 4252 wrote to memory of 2684 4252 190bc55d8b7501b7c3ca523267493fd0_NeikiAnalytics.exe 84 PID 2684 wrote to memory of 4152 2684 cmd.exe 85 PID 2684 wrote to memory of 4152 2684 cmd.exe 85 PID 2684 wrote to memory of 4152 2684 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\190bc55d8b7501b7c3ca523267493fd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\190bc55d8b7501b7c3ca523267493fd0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\cmd.exePID:2684
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4152
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5c8f3b25fe8352ba68c7ad8c40546ab6a
SHA130257a059d47fc8c259336946c797c7aedf71945
SHA25699d9371afd47151a3d25515ddf6bf0c95064772d83d4adc837838312bfc927a5
SHA512d79a70d41ff9b364ae98d0c59c51ec8b9dc7dad04ecd82c50fd493c8026b94feeaa0e334d5965d82e905658ce1f042cdacdb38a332f30ee0c9dc7c6da1c10b2e