Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 05:43

General

  • Target

    8b1ac1556360d196b73948ca8a80ea60_NeikiAnalytics.exe

  • Size

    28KB

  • MD5

    8b1ac1556360d196b73948ca8a80ea60

  • SHA1

    0e76dec75a596fd1e53e52ecdaa559baab67974c

  • SHA256

    bb75ea7a8c69a14465749fbf4c4be6fa57f8586a55545da39f55fc256a163630

  • SHA512

    059040d6e58b5720088457ecd5d7ac4208021da9bb2168220a4a377482fd18c96106e35d49f91384d348e19a9c54d308887b4e1af0035b73005e578ff2b7662a

  • SSDEEP

    768:PVEHJqjHyGvwFylDpulVSQJrE/2QmlCYZU0mP:PH2nylslwHCCLX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b1ac1556360d196b73948ca8a80ea60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8b1ac1556360d196b73948ca8a80ea60_NeikiAnalytics.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    28KB

    MD5

    5197ea5a021e3d701dcc98ce53cf7bf6

    SHA1

    013e031b2af4b569c4f4a23fd4004e5581beacf6

    SHA256

    830aa6723e522ada79ebb705b994f30bba753d22e90435136f7b20787208e2cb

    SHA512

    3bc14fd0a84ae8b82e91fbfd55bccc9de3c9a15a1ddbd825d156b13c7b21a4960694c3b5391982e4d21cb03e146378ff898c6d35bca81a1311e2c14e1c58512f

  • C:\Windows\System\rundll32.exe

    Filesize

    29KB

    MD5

    f63cd7c3a5b3c5ec5ad09de506b13d27

    SHA1

    da169431447bfa4231ce4c122616c72e16d587c6

    SHA256

    291d3ad6c078e097b8a55cf54e3f575b79756a563836e63e56a0136fe0c3ab64

    SHA512

    b2d6e5bb0b76cfba229ab42e7b61ee25b1a2085fd5a67062d96c4c4e575deaf83a2f0eb10a1eb6da400b132f5b1ddfb9407a3aa97dbb75c81677fb5f4bdf1a74

  • memory/1028-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1028-14-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-20-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-17-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-18-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-19-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-15-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-21-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-22-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-23-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-24-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-25-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-26-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-27-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2952-28-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB