Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 09:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe
-
Size
52KB
-
MD5
b79f43094c129bfabb09275938832b90
-
SHA1
da6d1dc6f180c2461210f9cb25b6698931284236
-
SHA256
4f05803747de7da4fb8d16844eb1cd1015b39103980b6d46b73c54fce6c6e2ec
-
SHA512
73291d8284f2678695fc614d6ca75c80d784ddfe89c886d608848912d3253f876ef36104ee7c2c81df74a17ae7aac53bf67d4c7264bf05224330a857a3430128
-
SSDEEP
768:zUJRwokqmnZA8LqPCR/cZoveftjXmO67Z893hmh9m1dYheKAFZ+yw2qgeBIjw:zUMhbNR/LeVUT81weKAj+n2lz
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3172 set thread context of 720 3172 b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 3564 720 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3172 wrote to memory of 720 3172 b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe 81 PID 3172 wrote to memory of 720 3172 b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe 81 PID 3172 wrote to memory of 720 3172 b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe 81 PID 3172 wrote to memory of 720 3172 b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe 81 PID 3172 wrote to memory of 720 3172 b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\b79f43094c129bfabb09275938832b90_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\b79f43094c129bfabb09275938832b90_NeikiAnalytics.exe2⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 4323⤵
- Program crash
PID:3564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 720 -ip 7201⤵PID:3068
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request75.159.190.20.in-addr.arpaIN PTRResponse
-
GEThttps://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90Remote address:88.221.83.232:443RequestGET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
host: www.bing.com
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-type: image/png
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}&ndcParam=QWthbWFp
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
content-length: 1107
date: Wed, 15 May 2024 09:11:40 GMT
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.e453dd58.1715764300.60bece2
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request232.83.221.88.in-addr.arpaIN PTRResponse232.83.221.88.in-addr.arpaIN PTRa88-221-83-232deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request17.14.97.104.in-addr.arpaIN PTRResponse17.14.97.104.in-addr.arpaIN PTRa104-97-14-17deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.173.189.20.in-addr.arpaIN PTR
-
88.221.83.232:443https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90tls, http21.5kB 6.3kB 17 11
HTTP Request
GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90HTTP Response
200
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
75.159.190.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
232.83.221.88.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
17.14.97.104.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
13.227.111.52.in-addr.arpa
-
71 B 1
DNS Request
2.173.189.20.in-addr.arpa