Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 06:14

General

  • Target

    91970b5fc9e24784d9e9621434a36170_NeikiAnalytics.exe

  • Size

    94KB

  • MD5

    91970b5fc9e24784d9e9621434a36170

  • SHA1

    2a2a527a9b35f78ec0f9206160c82da965793ad8

  • SHA256

    e0fd32068113943a8582201a82d58ba9ec79c5be78c49680a240da2ef6c75f25

  • SHA512

    df2515768a55cb210d1f0a3172e2badbfc2ad96d193142afe1e8c0f14608e191ed8d74b9e27beea5e6dc8b220ae717f9895034655e2cbee76a1f74c3f13dbeed

  • SSDEEP

    1536:PGYU/W2/HG6QMauSV3ixJHABLrmhH7i9CO+WHg7zRZICrWaGZh7ub:PfU/WF6QMauSuiWNi9CO+WARJrWNZ4

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91970b5fc9e24784d9e9621434a36170_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\91970b5fc9e24784d9e9621434a36170_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\ProgramData\Update\wuauclt.exe
      "C:\ProgramData\Update\wuauclt.exe" /run
      2⤵
      • Executes dropped EXE
      PID:1028
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\91970b5fc9e24784d9e9621434a36170_NeikiAnalytics.exe" >> NUL
      2⤵
      • Deletes itself
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Update\wuauclt.exe

    Filesize

    94KB

    MD5

    848da3d21e696f5675c21978945a64a4

    SHA1

    012e44a8c3b90aa3e0392759eb9c16040bc340d3

    SHA256

    1f4eb9e7248ab770168e67ec405a2f2f8085b88ec915c4abcfb420ae1c658e2b

    SHA512

    ca3c225dbd7110d0ba12d5baf10e7f43967e3c23032f1ad1f2c86aeeca7cfd05b6dd68ba7bc39909228190ed5ffc9c3d20ba5dad993fa28292075d124bc9df35