Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
23e17122345af0e88d373f01dde0f8c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
23e17122345af0e88d373f01dde0f8c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
23e17122345af0e88d373f01dde0f8c0_NeikiAnalytics.exe
-
Size
41KB
-
MD5
23e17122345af0e88d373f01dde0f8c0
-
SHA1
8955110c03f5789f6f391b7eda13cb978158e80b
-
SHA256
6d85d0398dda7ee9b6c1c2daa14dddf5a06008796d0fe64c3a05d79d984b61be
-
SHA512
085136d2c565ef20d23f45d95effb15364063df094a99869df66b553882a058ab581ab3dc368c7a812e23bd3eb2f34a8cbed478aebfeca9beec281b088d66755
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAy:bCDOw9aMDooc+vAy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 23e17122345af0e88d373f01dde0f8c0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1664 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 1664 4648 23e17122345af0e88d373f01dde0f8c0_NeikiAnalytics.exe 81 PID 4648 wrote to memory of 1664 4648 23e17122345af0e88d373f01dde0f8c0_NeikiAnalytics.exe 81 PID 4648 wrote to memory of 1664 4648 23e17122345af0e88d373f01dde0f8c0_NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\23e17122345af0e88d373f01dde0f8c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\23e17122345af0e88d373f01dde0f8c0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5b8e91da28b92f5e84f22e24a3ebaa696
SHA1c9b652fe112fbf58a996459afcaf6ff1274b2fa0
SHA2568efbcf5d88ecd61cc1dd51f85a617166c363dff76b06a76d37b99e1d5ca69696
SHA512238dec2e90cdb0a65e8ff42845ff72508caa9fffd678a138d9e9826fcf81a198f3ed795fef1671f3acbf5e9c9293635112ad5ec33ef679e20fa676fe4ed3a769