Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe
-
Size
65KB
-
MD5
283dee9f2df507a3b47a5d62c892cfe0
-
SHA1
43169099660c63e67df5807724b208803f6d6628
-
SHA256
9a5f3efc2e30a5132f2db18269e7495b44c89f6f681a57c068b9fb515929bd52
-
SHA512
4adeae54493ce353a3b15ad2c88a30b22f732a3b9ea3cc2fbafa789f65fa4c6fb44b56429c2e62c9f9ad485ea14fedc05f203df5e21aeab4b1c06cce7a2c9532
-
SSDEEP
1536:/Ao0zj2d6rnJYulBJnDQEEa1EfBE+1EC1p1encpkt9+FrJECOaAesJaEsHTPua6f:/AoAliulHnDQEEa1EfBE+1EC1p1encp6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3008 2944 283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe 28 PID 2944 wrote to memory of 3008 2944 283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe 28 PID 2944 wrote to memory of 3008 2944 283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe 28 PID 2944 wrote to memory of 3008 2944 283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\283dee9f2df507a3b47a5d62c892cfe0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5e39e855d95352d4aaae8472fc417af31
SHA154113025a3a56633867f52d612d526f340c07e7d
SHA2560b532ce06b432404509aa5895194f1ae662239a9860ca08ad48d9d2750cc5f35
SHA51216861788ee33cf8c31dc468bb1e5ce0d23357c929099226aa23a326fb671f0c84cf8dc14628c71377c14afb0936fb74576b32f11b49857a550f64d7f787469e7