Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe
-
Size
49KB
-
MD5
fc116b9351e7ba7734f2eb53abe74d60
-
SHA1
d1d1493b57719bb5bc3c1dcdd27db11ab124bd48
-
SHA256
f76df8b55c3cf61ab72e16739437455d3c1385d1ed2a048290a8ee5ce1b75f4f
-
SHA512
70ac0a763c543b8386bb8fd37f84e4dabd408c55eff83d6c998f2af7a642d7ccf4146d6e132379a872c4bd5d1c2e0a831ea13d533380bff4609220404693e5e2
-
SSDEEP
768:eApQr0GvdFJI34qGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7X:eAapJlQsh7pWezEPJB+Oz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1036 sal.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2632 wrote to memory of 1036 2632 fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe 82 PID 2632 wrote to memory of 1036 2632 fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe 82 PID 2632 wrote to memory of 1036 2632 fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\fc116b9351e7ba7734f2eb53abe74d60_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
PID:1036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD54838d160f29769eb4873ab1a6c7df402
SHA171087cc7d68494761de5405c29f07baf774e4722
SHA25609761d1a22a1546be0258b742e5a7fa52cae5def64dc6461ffc63f55a3e01976
SHA512211574eebae75cc10ec82ae45893895aefdb4b6eac95f04b07194739dcacb513cef5aac9dd47c31d00cbc53081664df3978ac825bb2626ecd1d8e790d82c3def