Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe
-
Size
5.4MB
-
MD5
718f5422210e4098d930cf61a1a09f80
-
SHA1
9b010ef86a45c9881723dc43bbb85024677e29a0
-
SHA256
7583012f0fa1c3ffe4e2d191018751088b8e3a8959dc26a8e4e59669ec184d95
-
SHA512
74a91aadf1a6b8a7896c5f591d954df23a24cadb1def8357c072adf6d7574a37ee2c19d7b745d4eee48598a950e9e60bad87852936e1b056e8ebe13f9defd932
-
SSDEEP
98304:emhd1UryeDcbpVjiWKCK4F3MskEgV7wQqZUha5jtSyZIUh:eljcbp7KCXFG2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2996 6F3.tmp -
Executes dropped EXE 1 IoCs
pid Process 2996 6F3.tmp -
Loads dropped DLL 2 IoCs
pid Process 2912 718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe 2912 718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2996 2912 718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe 28 PID 2912 wrote to memory of 2996 2912 718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe 28 PID 2912 wrote to memory of 2996 2912 718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe 28 PID 2912 wrote to memory of 2996 2912 718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\6F3.tmp"C:\Users\Admin\AppData\Local\Temp\6F3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\718f5422210e4098d930cf61a1a09f80_NeikiAnalytics.exe 704A34B1CC71C1A5E20976AF14D0E25D9427EDED120AE6C00223130FDFCF2DD71E186D0BAF38BA780212A85D1032A3128AA75927D1B092E4A0EB413E1B3CB5E92⤵
- Deletes itself
- Executes dropped EXE
PID:2996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5873f2a02f2b57c6ed71c968b1bd23033
SHA1e8f298cb6b8c87058e21f4ce7c738f2318c9855b
SHA256e2c3722056f26fd64231501ab21b8a98a2009694a18395871da802a182430f10
SHA512c20d28a11c2e65bbaec222b54d6d2af4cd32c2fa3a077b1f74912802b613ae4f11f505e83e3a741f9d99a1022243dea29fb8d4d08ea0e918794a6d6b674aae10