Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
d1fc30ea4afc477c5a0a0b1d5b569050_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d1fc30ea4afc477c5a0a0b1d5b569050_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d1fc30ea4afc477c5a0a0b1d5b569050_NeikiAnalytics.exe
-
Size
37KB
-
MD5
d1fc30ea4afc477c5a0a0b1d5b569050
-
SHA1
5444d4774ff5e41a6414f120855d9c9c6998028a
-
SHA256
1b276fbf8b3e9f813d13df6d9eca1a6f30e53aa4ab065553fc046e2c9ca6416b
-
SHA512
a86d673459601e079d9654e0b06e1c99ab99e7caf5ce77308086b7585c433726e965755132c235cc91bbf5672aabd3c78efc9f93cc9f00a3b30d9ac31a87306c
-
SSDEEP
768:diHPOEUz9FeV714dp3Oza3g4rB/k1VXnoXkvD:d2EPeV71IJW91NoXe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 8 2352 d1fc30ea4afc477c5a0a0b1d5b569050_NeikiAnalytics.exe 95 PID 2352 wrote to memory of 8 2352 d1fc30ea4afc477c5a0a0b1d5b569050_NeikiAnalytics.exe 95 PID 2352 wrote to memory of 8 2352 d1fc30ea4afc477c5a0a0b1d5b569050_NeikiAnalytics.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1fc30ea4afc477c5a0a0b1d5b569050_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d1fc30ea4afc477c5a0a0b1d5b569050_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Delme.bat2⤵PID:8
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD52ec0ecf155ac6b104840b50ab0e8876e
SHA1d6ede2218071fea900e379474d3d44c13e33c2de
SHA256d03a143a1bec8773b58babced28f21832efa277dde33272b1dfd6b32c7b85686
SHA51283a5e70db7fa18ee483cb154ee0daf1b67777a6041a88005138000ed2eaf1049221b7362db36f7a2a5653d79137c69b7b0aad0ee2dd917636d7945a408d24741