Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
57aeae1d9ae522bda65d38582737b060_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
57aeae1d9ae522bda65d38582737b060_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
57aeae1d9ae522bda65d38582737b060_NeikiAnalytics.exe
-
Size
79KB
-
MD5
57aeae1d9ae522bda65d38582737b060
-
SHA1
ae7d4298658edb759e13e62bbd5d4f8ae0e10e0e
-
SHA256
df7fb1f927b10c503eca538f92fa87c08a6a47690b272386906daa2c4ba51124
-
SHA512
19f0657bd356bd280c99e00836266dff8f92eaa33feeb1adde1de07ea32cbbc51f5b0e2fb4f272890cf1069b03ace0a8d22cc41984343907ecea138db22d8235
-
SSDEEP
1536:zvto4eBdpfySdxOQA8AkqUhMb2nuy5wgIP0CSJ+5yzB8GMGlZ5G:zv23BdpfySdAGdqU7uy5w9WMyzN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2280 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 1996 cmd.exe 1996 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1996 2228 57aeae1d9ae522bda65d38582737b060_NeikiAnalytics.exe 29 PID 2228 wrote to memory of 1996 2228 57aeae1d9ae522bda65d38582737b060_NeikiAnalytics.exe 29 PID 2228 wrote to memory of 1996 2228 57aeae1d9ae522bda65d38582737b060_NeikiAnalytics.exe 29 PID 2228 wrote to memory of 1996 2228 57aeae1d9ae522bda65d38582737b060_NeikiAnalytics.exe 29 PID 1996 wrote to memory of 2280 1996 cmd.exe 30 PID 1996 wrote to memory of 2280 1996 cmd.exe 30 PID 1996 wrote to memory of 2280 1996 cmd.exe 30 PID 1996 wrote to memory of 2280 1996 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\57aeae1d9ae522bda65d38582737b060_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\57aeae1d9ae522bda65d38582737b060_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2280
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD55b93c18a1482c6702d5df020f64463f3
SHA163531ce9c6077a31ec4aaca0b8e5c3a512823076
SHA2569350f8f1b6e5b77339f1b49a3f69ab853ced342f8db17ce71ede1a37bda44920
SHA51299b68b1fc027ba518d0afff31ffc6d4312ab338cc0576fd9ebef13c37ca528c8c39a9bf72ef2ba314f3d42bf2dcfac06f288745ce8173eb6f1c79812408374ed