Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 11:33 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe
-
Size
480KB
-
MD5
d32d8248385f04ca5053f1d9c14d28d0
-
SHA1
4c24038b7f14d102cb36d97735e0d76579a5576e
-
SHA256
40145cfbe54bb420e1af7808a1fae3d0fe8dce988b6492a5a70635e188a7093c
-
SHA512
129bf4a1be0e2002ff2af2e2ced64984511d73b4d811d2e9cfbf4069cda31972f036b554209def297ec3a5d0ba62578f279c351362ed702f9acce0a0c1c9e88e
-
SSDEEP
12288:AjauDReWw0IA9xkQWrutKXJ7f/BDWxQ1LqpdTd:ADDs0IA9x0rutK5/BDj1kTd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2504 smqmw.exe -
Loads dropped DLL 2 IoCs
pid Process 2656 d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe 2656 d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\smqmw.exe" smqmw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2504 2656 d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe 28 PID 2656 wrote to memory of 2504 2656 d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe 28 PID 2656 wrote to memory of 2504 2656 d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe 28 PID 2656 wrote to memory of 2504 2656 d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\ProgramData\smqmw.exe"C:\ProgramData\smqmw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD5d8d73f67fc663f10ade247361deb1d4d
SHA1a8e0338a853a0fb41369fa3e0fa17d5a955c753e
SHA256cf43d9cb0bd1a3bc70bf0450b4a7d3296d118f288fa8f93923d1c9137be77d6f
SHA51299b459c7dfbc16d5b357e14a4cf9a32a801d36bf5ec3abb5b9f685380c09561f3212849c9b3881c8989e282783eb34a74473c5643e02adb1cfcaa7aa1a5a92eb
-
Filesize
136KB
MD52bd01b99551cc639ddb5cb66914904a6
SHA150beb8bab8be15271951130ac833eb19566f9333
SHA2569764e531dd52e37a454c7f052a17fe7b68821dc3570286aab7bb4706639efe40
SHA512374436459d62bdd62fc79b779e5aef155d7b8817e3d64e53639130be49d061a251d04a3882d403c1cacf890f91fa53e9137e551f3f6479341e09fe97c7bf2390
-
Filesize
343KB
MD5d501436a202776134947be29d55ae6c0
SHA10061da84ac614bc7649e20241595b90cb6d6132d
SHA256d6901f65c1d3f8ba03311d70cf7647c35d67d79c517ee8a99573ce0e344ac7ad
SHA51294a9e892421f8fdbdd7cf12885667eac3393e956a19edae9684e4b53b5e2f408d8145ee649b06b3141f929bcb5fb51704b996781a169069327c9cd8a5e76d143