Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe
-
Size
192KB
-
MD5
ad9297c96b3e7fd449cff844e955d770
-
SHA1
cfa192f543b6de525fc06c98ff6c3e328b3cdbc6
-
SHA256
4b22ac9b5f8b55317d59ea40db785712c898e0183e3d407d528914e6fc74afac
-
SHA512
e97b4dfd267a2e628cf3e60a495820ff02d476e0e772ced0b84b3f6c2f86ec6b42cb8bdf6eda3b2d115f734a2b4e5648df42a81fde0ecdc6fef0a5da894dd57f
-
SSDEEP
3072:U3gIMNOu00o71G8uySLnjN6t1si1DLoUPBt0wV8Cp0+cueGmlwo0yRzzYMK5V8Uh:U35Mn00UuXjqXoUYwZ9TsMNp21Q53BDh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1268 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2860 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1268 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2860 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2860 1268 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe 28 PID 1268 wrote to memory of 2860 1268 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe 28 PID 1268 wrote to memory of 2860 1268 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe 28 PID 1268 wrote to memory of 2860 1268 ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ad9297c96b3e7fd449cff844e955d770_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD57ab913ebb96186ff19d65dd06f86233d
SHA1381d37b3f8534c10cd532fd4e3fc905a3a5f8672
SHA25668cfb2a1d92bcaca8b22179cc2fb5e44f4649f2175d0820ce92e4b2a5e34e877
SHA512bfe639d60214aa8cce5c9bc78c499ebf6c367b2bd99d87cb0d592af3c5d172f13e53d6092ffa7195e81f6cd2b10672d345c1a1a45172ca1718cd82e7cd8945e3