Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe
-
Size
2.8MB
-
MD5
5fb96aafe860802a6785ace980989ac0
-
SHA1
b22d251bac3b0058ac61b0596d0dcf34c828491f
-
SHA256
10e91233f0e62cbba0c8221cf57e05b6219f3370709dc2330c2de7d971fbb8c7
-
SHA512
c76b36a389c94609fe9eff3777ae6cf4a312f1382ffa704891830d88b26e0947353e9c4ff2498826cfe1fa165e204ded1ffe297b0bbca98222081a74b8729f13
-
SSDEEP
49152:GnvR8t4T3Dv5/4QgxBRKwpVjkr4sUz3H4fd/EknDbcwLmNQX1SYCgXJqeWwx:tkhDwpXlTHApEkDbcwLY8UYC/Z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 304 SETUP.EXE 2900 VIS32X.EXE -
Loads dropped DLL 10 IoCs
pid Process 912 5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe 912 5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe 304 SETUP.EXE 304 SETUP.EXE 304 SETUP.EXE 304 SETUP.EXE 2900 VIS32X.EXE 2900 VIS32X.EXE 2900 VIS32X.EXE 2900 VIS32X.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ViSetupInitProcess.log SETUP.EXE File created C:\Windows\temp.000 SETUP.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2900 VIS32X.EXE 2900 VIS32X.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 912 wrote to memory of 304 912 5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe 28 PID 912 wrote to memory of 304 912 5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe 28 PID 912 wrote to memory of 304 912 5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe 28 PID 912 wrote to memory of 304 912 5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe 28 PID 912 wrote to memory of 304 912 5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe 28 PID 912 wrote to memory of 304 912 5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe 28 PID 912 wrote to memory of 304 912 5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe 28 PID 304 wrote to memory of 2900 304 SETUP.EXE 29 PID 304 wrote to memory of 2900 304 SETUP.EXE 29 PID 304 wrote to memory of 2900 304 SETUP.EXE 29 PID 304 wrote to memory of 2900 304 SETUP.EXE 29 PID 304 wrote to memory of 2900 304 SETUP.EXE 29 PID 304 wrote to memory of 2900 304 SETUP.EXE 29 PID 304 wrote to memory of 2900 304 SETUP.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5fb96aafe860802a6785ace980989ac0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\VIEXPAND\SETUP.EXE"C:\Users\Admin\AppData\Local\Temp\VIEXPAND\SETUP.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\VISETUP\VIS32X.EXEC:\Users\Admin\AppData\Local\Temp\VISETUP\VIS32X.EXE C:\Users\Admin\AppData\Local\Temp\VIEXPAND3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5698a09de25d0c0e633bffaeaf720bff8
SHA12fdd72220ec1e651c6e712df740a5946c89ababc
SHA256a630014395f8bc6efd368b446ff72f80b23f4c751e617511bd4b139fbb87a795
SHA512190d1cc76b5fa1ea89741a2ea0c18b65bab103da16b33b71f1fcb5a6ae025625c382db865f8167d5b45644e167790ccb5c1428c1805d9d0781a26d856f467365
-
Filesize
409B
MD5a78a97db31e02a88a628ce4bdb983fe3
SHA1d292ce578cb9ee4d7220514959500677e45199fb
SHA25626723593e234c27348bf325f18c1d7e105f552cb51414281589dbe783d6bae39
SHA5120d86faa5d11c3104c1be569e6fc4d2de52376be8560066253323cc6e44b4594af00797530c7c2f6d272143856d26f4304c1e9b337b03bc4530ac2506faf668ab
-
Filesize
108KB
MD5040ff964d8e643010fdc1a084d091e8e
SHA1ad95d17eac0e535d944c052b1c087e76162ddc23
SHA256bce5281d9875c5492db38371bb3e911dae7383594c6afe3908a06cfb69a35c2c
SHA51254f226dff9f4d5a269917151de1f736af54a0747bfe7cc0352579c8ba830710e39144abb708c19619aeb60ed4b9a29fcb3ff291bb909b833432020ad29781597
-
Filesize
7KB
MD516c9f62d4118e533a534c264012043bc
SHA1ecef298e08b70da522ae91535206792653881b66
SHA256fb7a5ea2ba0bdc624a85316ffd06bf2647fdccca0cb5bff05deeaccc78d42bf6
SHA5129a0e73bea4987a369dc0ffd904a8fdbc0a06fea8989695e68e1f7b14b874e9a646d08718751864b0735b2b8bb0acfef0ecfc3db7a1886b6d7ece9eaa85bbaa67
-
Filesize
2KB
MD5e3ae367b00ff2e40cc9e924560f83649
SHA1d628967b6b63201e023faca4a2e3f8c671bdcc78
SHA256bd414ea92432ab851aa80bcd03f90427db437f46ee55f8c8edc2c546a96aabd7
SHA512ed83d88bc50be4705bf9f181f73186ce564e2d7505b07dc7bc4c77148cdabbe9c97626901c64a34552b13e081f98dccfabc661738adb9643714213f317de3ba0
-
Filesize
344KB
MD563910054d77b012e2ae4492d9997d611
SHA1495b89af8a7422e6896d1f34c0e5c8e1e4882fd8
SHA2567259f8199d48ee2642fad56778036f912e2e55139bf34296cd0a48d59d8cc449
SHA512ce12783b2113f73465beae0a4f15434d159e13fe3d3247141932e40cfab2729888aed8cb4aeada0250c99a2021e1f21b172445d9729a1f9a35fcb8330b625089
-
Filesize
6KB
MD545d735c6b93d464e2a293d0f766c8031
SHA133557bd4055589504ceedfd96db6e284c10a8e4c
SHA256e1f4c8eccd8255e1926b7f1a627213694fe39f7ec584629a698a1c37a6170f3c
SHA512be72c42ea2e1d14ceeaba0ca9f932093245c95a71444f513773ec3b523dec375a6a7826e3decca25ccf7e6552415efe0c77185f05a9ec52df9dae74f8e56f135
-
Filesize
152KB
MD5288b65894b02eb372cf4e400d87b4268
SHA1facce8bfecb4b053d2afe332056ebc0bdcdb0e5c
SHA25670e6b0619dc2a9cb4c17482fbd0db24a1bbea3e5435ec379160830e261ce7d8a
SHA512a2661179156fe127996a4ae0fe7c30b43e8d5ae20e42b5a33cf29ff7ff21409250c2d097dc5d3d5e5aa3b4c9c761683576590a312b24b8aa2c5cd16f95c2989c
-
Filesize
45KB
MD540d09e341cdce1a03936a575998e0518
SHA15c3674b1b2acae23f10648ef550846e51459f4f2
SHA256606dbb8186e71bef39b7c61cdefc568ec62de8381d048746ccd2911c1ca14058
SHA5122e3854ac9efcebde9bfcda7d6f7c92487e18055948d9bb17e26d9a117da849f9df5f2d55a3c6b305b866722642256b864d5707e5928f30231d71853794543303
-
Filesize
745B
MD55c8dc7de2f97a3a1894c0d8c495ba261
SHA11cbad318f553e951e1a00d0e3915835e697bedad
SHA256f3a16c49d643a7efb0bf2b0bb6ed1f4aa2abbdcb0c8e3bfad33a952793f5c0ca
SHA512bda908eca26a1e4e4506e34bf293e37ec024a0ccebc37624a37a07fb302bf1250efcd2cfc10666b8eba3176c7ba90150da0dfac13ffbdc998961e9aada7b3f2a
-
Filesize
1KB
MD54c2215089b4823ecc1670ee76966c67b
SHA12c363354ce51ccdeec15da5d7a2c2fc32ed9cd20
SHA25634cd423fe294d24fe99c7e7e5040341dfb47dc757ac6460635442332bea1868f
SHA512b336ac9d1d0f0b8498a3e5dc6d75dbe125f0296f9416ec49a88065cf18053bc85ab622ca780ae1225a896975589558663813c5e79445ce47e28d2387f9095854
-
Filesize
56KB
MD5856237d4efd4891f28363624d82def3e
SHA1da33afd849522d963cc96384e1a3e01c19dbf816
SHA2560646ed494bd9e59976a2534afe525297895b478bc3247f088d109c7f3e8ed93a
SHA51209b85dc6d757e4225f5359f851ec701d8c49bcde7529e1bcb8dbe2ec46656951da3f936aa95bb51ec29cb75ae7e1abd595cfe161481b72464a095174c7627fa9
-
Filesize
75KB
MD58d64fa18e26d4e06dfefce76c7d45dd8
SHA1237b4459b7949949117447ff3d7a094259ebf6bc
SHA25659fcc793fc77f3e2fbe8fe01c670c0943a7a1087785a1e735f43b0e0800b0412
SHA5124054e667777d58c3053aabc180668be771480564288a24c5392e62d95bce0bb5e565b8efff538ad149c685679a5a3403dcf8c2836bc0f38e98b2af87ea900aa8