Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 00:56 UTC
Static task
static1
Behavioral task
behavioral1
Sample
34cfddf586011ee8ec3abd7e186b66b0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
34cfddf586011ee8ec3abd7e186b66b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
34cfddf586011ee8ec3abd7e186b66b0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
34cfddf586011ee8ec3abd7e186b66b0
-
SHA1
a0c3f65bf87d6cd5bda2b20c2a118a400887e7d1
-
SHA256
2cab6e4e41d9c2ac64a33dbfc739fabbfc21a71ddbcd28ebc416842894f22f2d
-
SHA512
ef58479722074ef90de5ba4377177e78b0760c9101c72c8ef72c1cb93bf3dd92219d4c225314eaa270e9ff441635259634e7b7c9c0e63bc0af6eb43e261a7d29
-
SSDEEP
1536:zvxVDuD1AYrOQA8AkqUhMb2nuy5wgIP0CSJ+5yOB8GMGlZ5G:zvPqT6GdqU7uy5w9WMyON5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2000 $TMP!10@.COM -
Loads dropped DLL 2 IoCs
pid Process 2396 cmd.exe 2396 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2396 2044 34cfddf586011ee8ec3abd7e186b66b0_NeikiAnalytics.exe 29 PID 2044 wrote to memory of 2396 2044 34cfddf586011ee8ec3abd7e186b66b0_NeikiAnalytics.exe 29 PID 2044 wrote to memory of 2396 2044 34cfddf586011ee8ec3abd7e186b66b0_NeikiAnalytics.exe 29 PID 2044 wrote to memory of 2396 2044 34cfddf586011ee8ec3abd7e186b66b0_NeikiAnalytics.exe 29 PID 2396 wrote to memory of 2000 2396 cmd.exe 30 PID 2396 wrote to memory of 2000 2396 cmd.exe 30 PID 2396 wrote to memory of 2000 2396 cmd.exe 30 PID 2396 wrote to memory of 2000 2396 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\34cfddf586011ee8ec3abd7e186b66b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\34cfddf586011ee8ec3abd7e186b66b0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c $TMP!10@.COM2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\$TMP!10@.COM$TMP!10@.COM3⤵
- Executes dropped EXE
PID:2000
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5538a5a7a99148ac1a6867df3967db5a8
SHA1e91ff3c01aef37ab53062338fa77c81dc511c3aa
SHA256043372a05da11dd7e9f03feb054785dfd23f27352595d24b3c9682e45533ce72
SHA5123b6cc9eccdb5730952ea35fd6882679ba9d968b4e7ebad9cfae4467b479a1aa01c55abcc9b7e29592a0545ceb4af50ff39ef73c793bbd52ea2d60ab7e0f51288