Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    34s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 20:19

General

  • Target

    111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe

  • Size

    538KB

  • MD5

    111dc7c00c7a8df8159d6e0f95c4c190

  • SHA1

    38fe5530886375e0b33f978199849eeb68bfe4a9

  • SHA256

    6d7dfb457e2569ad67b51b416dae8bcedef012c8ef96977bc3e7f2e502e91985

  • SHA512

    ed1395b2a2507c9cfca6bef496fa94b67e61c325682e2fadb3bb4613de8512eb035e4cc8012ca8a0970093bf616c03dfb57ea204da7f4ea2eb3c210930060be5

  • SSDEEP

    12288:wlbU+h1gL5pRTcAkS/3hzN8qE43fm78Vk:WbU+w5jcAkSYqyEk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4760
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev88.tmp!C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Local\Temp\111DC7C00C7A8DF8159D6E0F95C4C190_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2696
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev88.tmp!C:\Users\Admin\AppData\Local\Temp\111DC7C00C7A8DF8159D6E0F95C4C190_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2964
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3740 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2000

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\111dc7c00c7a8df8159d6e0f95c4c190_NeikiAnalytics.exe

      Filesize

      538KB

      MD5

      04e1acac5947d5ca3e3eb0ab2ad980b8

      SHA1

      b49459959b6dd8a922c0f783599a1c6082c347dd

      SHA256

      b8de3fc592ed2ea1f6b4fc1cbee247b4c4688b8ed237f430f14e6a9fa29025ba

      SHA512

      d11fa245ce000e14b09c1e77bd9fc20f1a90cc8629aabd46a0c49b9dcf20252e65b1399f2dbdab2755fc64ffb54d8faf6f6452fae16cf88f3ed4ee4057b886b9

    • C:\Windows\MSWDM.EXE

      Filesize

      80KB

      MD5

      3bad16e6b9791239f0136f664c22ace8

      SHA1

      a92f82890a3ac797b3e5d51840be75376e751a0f

      SHA256

      6b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17

      SHA512

      ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd

    • C:\Windows\dev88.tmp

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • memory/1868-10-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1868-23-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2964-20-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4760-24-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/5088-0-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/5088-9-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB