Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe
-
Size
223KB
-
MD5
8f61db31c18507290290fe903d867e60
-
SHA1
7194200e1bfae632d7f89b46ea734135506a7579
-
SHA256
d8d409a8d020ea7f8d8d515aae38542a4995217f799ecbf7f3606dfee25ede11
-
SHA512
3d9c756c7c125cb279569dacb426ecc7495c45faf20e0f1799288b839dac194b35ca8f2b71c779d3001b25d2e5dbec1afe6b7ccc3a956688679e45e3110c5ee8
-
SSDEEP
6144:u5GgJgBhFk801VcNliLcKQ8tqHz3I/COWP:IGtu1VK8LcJ8tqHz+COWP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2412 8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2412 8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3668 1504 WerFault.exe 80 3776 2412 WerFault.exe 88 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1504 8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2412 8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2412 1504 8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe 88 PID 1504 wrote to memory of 2412 1504 8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe 88 PID 1504 wrote to memory of 2412 1504 8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 3962⤵
- Program crash
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\8f61db31c18507290290fe903d867e60_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\8f61db31c18507290290fe903d867e60_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 3683⤵
- Program crash
PID:3776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1504 -ip 15041⤵PID:1168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2412 -ip 24121⤵PID:1308
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5fa48bafa62edda5292f7d2840ddca07b
SHA1e6312281e8eb10af8664b4213ee60467f29b2eea
SHA256213478928b6b8683c06c75a7c100c5a44fc2d178c05fa66aa5027cd3f583a325
SHA5127e496841713a16f7bc928d9f8249cf522263e311a7af3ed6d8d9d5a284088a54b48cf63cd4db05b1109417273c6470f10072c0269fa4ee3225bf41c0e51b95e7