Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 15:57

General

  • Target

    bdaffdf4722b60b04d74b7a66cda2680_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    bdaffdf4722b60b04d74b7a66cda2680

  • SHA1

    06897de3d90cf685eeb08e8e7ba04d3b6e7032c5

  • SHA256

    8ee79e97086f20b98d43dcd57a00f2fe2b0cd19820ad4b99881547a25a9ea0f6

  • SHA512

    439e624cd1bf9ef581feb5cd0624070e30f5e79d74019b15abb208253932b347dfa996f4d45e617d0e8ab2ee3e504ff2cdc03d02edcf4edab7d685509819db71

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+bK:LJ0TAz6Mte4A+aaZx8EnCGVub

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdaffdf4722b60b04d74b7a66cda2680_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\bdaffdf4722b60b04d74b7a66cda2680_NeikiAnalytics.exe"
    1⤵
      PID:3952

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-MnU0h9okdbulwZRb.exe

      Filesize

      83KB

      MD5

      6ff22da3dfc7da421a1c6912fae163d7

      SHA1

      2bbbeb4755c20d31b045cdfc138477f798ec47de

      SHA256

      a9a9820ef5ecf276d6ff8c21c367e3bece3897f862e6ccac9916dd9fb633b293

      SHA512

      b24dc137617709f297bdc1d740e4648dc94f451f2d2dec00fbd5f702f64067bce9cfa9d7bce1de1faa25cef8d86c6cb63fb20621e75937bc36a8547e385e2333

    • memory/3952-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3952-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3952-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3952-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3952-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3952-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB