Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
7ea37fe978800af84bf29703c88e23d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7ea37fe978800af84bf29703c88e23d0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7ea37fe978800af84bf29703c88e23d0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
7ea37fe978800af84bf29703c88e23d0
-
SHA1
acbf617fbf2b0dc87584b4c40ed887729dd3c301
-
SHA256
367f2a7221a749b24df1bfc78dddc6df6db21d494e571a347b9394a91aee5381
-
SHA512
1fdbd7f7f61a4df3f02f46badf6e04e5821b86f00a169f7c8d0fd41dbb7101de551f6058717dc9920916c98c8ae01e22e9ddbcc7e9b1034f3f90d64b1b069f09
-
SSDEEP
1536:zv2CgLZHzb2xsiOQA8AkqUhMb2nuy5wgIP0CSJ+5ydB8GMGlZ5G:zvsLhFHGdqU7uy5w9WMydN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2392 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 1328 cmd.exe 1328 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1328 2220 7ea37fe978800af84bf29703c88e23d0_NeikiAnalytics.exe 31 PID 2220 wrote to memory of 1328 2220 7ea37fe978800af84bf29703c88e23d0_NeikiAnalytics.exe 31 PID 2220 wrote to memory of 1328 2220 7ea37fe978800af84bf29703c88e23d0_NeikiAnalytics.exe 31 PID 2220 wrote to memory of 1328 2220 7ea37fe978800af84bf29703c88e23d0_NeikiAnalytics.exe 31 PID 1328 wrote to memory of 2392 1328 cmd.exe 32 PID 1328 wrote to memory of 2392 1328 cmd.exe 32 PID 1328 wrote to memory of 2392 1328 cmd.exe 32 PID 1328 wrote to memory of 2392 1328 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ea37fe978800af84bf29703c88e23d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7ea37fe978800af84bf29703c88e23d0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2392
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD59fc140096ac94fd93626c0a7a2a63616
SHA181429b1d6c95ff2c4281d6b427b0de1860e0627f
SHA25622df4bd2dc8d709506e88f785c0805398a4dd61bc10dfe691f4677044faceede
SHA512a4389fc79153879d43fa1da4e5d5796618ecf3f4ebda7c765548c97241642023883dab0326122d5ca7ca110f2deb42dbd9e32d94c0e334e47c8cc3919b2278ae