Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
7b302c67c98ea001d667b1f250f9acf0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b302c67c98ea001d667b1f250f9acf0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7b302c67c98ea001d667b1f250f9acf0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
7b302c67c98ea001d667b1f250f9acf0
-
SHA1
490dc5d2c6ddc807a8673d160c40aa60ee023533
-
SHA256
c2e3b7ee324e1d12cacd6333cf4be57f6e0168be1992bfdb03453de48af6a626
-
SHA512
6a9545e15788ba3c21037b3b9f6c49531e3fd57f8881ff52ccc3ef30676f980789c01a45b9f3e42e04c31063c62b63bf126760e23964f53e2a3ad3218233323b
-
SSDEEP
1536:zvWVp8E5yc1l8OUhOQA8AkqUhMb2nuy5wgIP0CSJ+5yhB8GMGlZ5G:zvAiLOhGdqU7uy5w9WMyhN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3780 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4856 wrote to memory of 3696 4856 7b302c67c98ea001d667b1f250f9acf0_NeikiAnalytics.exe 83 PID 4856 wrote to memory of 3696 4856 7b302c67c98ea001d667b1f250f9acf0_NeikiAnalytics.exe 83 PID 4856 wrote to memory of 3696 4856 7b302c67c98ea001d667b1f250f9acf0_NeikiAnalytics.exe 83 PID 3696 wrote to memory of 3780 3696 cmd.exe 84 PID 3696 wrote to memory of 3780 3696 cmd.exe 84 PID 3696 wrote to memory of 3780 3696 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b302c67c98ea001d667b1f250f9acf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7b302c67c98ea001d667b1f250f9acf0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exePID:3696
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3780
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5fcedcd38e637e5d2ae33637ff8045f60
SHA12a492902f90b91170a84b8439b1aa60300b540fb
SHA25696c0d7cc2fd38aa57b316b76300a9e32569d74c38fb183143cac0bdfb6c183ee
SHA512b7b59dbed115dd62bec1040e3905e6b5db8164b1204946ce449f5aafeca0388f5ddbe2f8fba770bc318d1af4ce7fba0c9f60c0b20610b4b4f6bb12ecf66e1fe8