Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe
-
Size
5.0MB
-
MD5
1c19a44740138f65b4b2a631b0078420
-
SHA1
63a07297db36efc137d42ce92ab0c4cd56b6d0ac
-
SHA256
7ff9ded15ed921c55d5eeac53ff83d6d4906da59bb36280737fc7e72e43639c5
-
SHA512
ccc74cce4612dda9e41b4dd3a793b1c4040d7a9ae192ef160101061006e4e6a2619b43d764845a37b4f15c53c9bdf809de09960081fd4e86227745d92bcd603e
-
SSDEEP
98304:9FSPl6PaAsaAEAsAEACaAEAsAkEAzsaAEAsAEACaAmAEAsAkEAzsaAEAsAEAC+:LSPl6PaAsaAEAsAEACaAEAsAkEAzsaAQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2980 klakdgi.exe -
Loads dropped DLL 2 IoCs
pid Process 2968 1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe 2968 1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main klakdgi.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2980 klakdgi.exe 2980 klakdgi.exe 2980 klakdgi.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 484 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2980 klakdgi.exe 2980 klakdgi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2980 2968 1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe 28 PID 2968 wrote to memory of 2980 2968 1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe 28 PID 2968 wrote to memory of 2980 2968 1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe 28 PID 2968 wrote to memory of 2980 2968 1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\klakdgi.exeC:\Users\Admin\AppData\Local\Temp\klakdgi.exe -run C:\Users\Admin\AppData\Local\Temp\1c19a44740138f65b4b2a631b0078420_NeikiAnalytics.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD54a2a1e3f0b64cd72cde15248415bba48
SHA12679e42110804feacf8e0cdb7bdde9be3b28e7e8
SHA256458a00c9fdd519ee36c31717a7eb0a56395dc33ec12cc720cdb5f22b2d105955
SHA5128c5951b4695731f8338e8b3c3e419ecc8e2b167cd0be0123599a10a677b0d63cc7623ce8f31591fe631a354f18fdfba952c758dcfed8feb02df9e4855cb9efab