Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
0d3cf55349d43459c14acd41c9be8b70_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d3cf55349d43459c14acd41c9be8b70_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0d3cf55349d43459c14acd41c9be8b70_NeikiAnalytics.exe
-
Size
302KB
-
MD5
0d3cf55349d43459c14acd41c9be8b70
-
SHA1
9f522612d0740821b10522b034cf60df641f550b
-
SHA256
8bc57e82b4f248b48c0c9686422c05a901f94a4eb4ca04ceeb68a59af7bc7be9
-
SHA512
35a953c8ca7e0fe77121c8a3b0e29a87b618321422c3161a012136c12d8475eb09e383f3be6edc1330682a2cc93b66dd3007d4d7f9db7936d6ea36356f60b5cc
-
SSDEEP
6144:VCDM2K8dgQZw88wNrRJQNy+z+t21vjdciLbyyPncWR4IBqUsvU2YYG5YE:VCw2K8WQj8dNyyR1aiLbZPnVRRqUXuE
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2932 tbckyxk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe File created C:\PROGRA~3\Mozilla\tbckyxk.exe 0d3cf55349d43459c14acd41c9be8b70_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2932 2164 taskeng.exe 29 PID 2164 wrote to memory of 2932 2164 taskeng.exe 29 PID 2164 wrote to memory of 2932 2164 taskeng.exe 29 PID 2164 wrote to memory of 2932 2164 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d3cf55349d43459c14acd41c9be8b70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0d3cf55349d43459c14acd41c9be8b70_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
PID:2172
-
C:\Windows\system32\taskeng.exetaskeng.exe {D50D60F8-FFC7-4572-B4B8-185F86EC3C04} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302KB
MD5fc3d981debae8e887b567c51aa24d932
SHA1aa9ce8a9fe62e02d8cb37045a3292792b6df13e6
SHA25693e4464443eb2e58019b856f5b58b20d6dddebd5eabba9bfb56fd1ed8de89089
SHA5123c6ce6c0190ee7e7748326619389a574c15e758bb8d73dc824e3585998c55840f9d3008f3a142211a8c5da82d10fc8a0aa4170296e694358675195fec45b2a81