Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe
-
Size
6.0MB
-
MD5
e17a635e7ea288bbb3e55c8554f59e10
-
SHA1
0184653e521aaf3a32c09fc2f8907480dc5e7e8d
-
SHA256
3743d2203bf1aff49eadb9e4d243f7f1dfb7afd2d10e67a519235f6c5e5e3f30
-
SHA512
415f436bdf20046702276d3f8e6c33fe3d5c89f0f57c694c7f835bc1c7b11e41964fed7e37c54beb860f3fc805963e1b68059eae6432c99409af46145c84ceb3
-
SSDEEP
98304:emhd1UryeuuYaBdnTV4g1uV7wQqZUha5jtSyZIUS:elomdneg1u2QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1276 2AB8.tmp -
Executes dropped EXE 1 IoCs
pid Process 1276 2AB8.tmp -
Loads dropped DLL 2 IoCs
pid Process 2416 e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe 2416 e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1276 2416 e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe 28 PID 2416 wrote to memory of 1276 2416 e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe 28 PID 2416 wrote to memory of 1276 2416 e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe 28 PID 2416 wrote to memory of 1276 2416 e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"C:\Users\Admin\AppData\Local\Temp\2AB8.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e17a635e7ea288bbb3e55c8554f59e10_NeikiAnalytics.exe 3D4839570A85191506C312CAB1A5BE5409D7AB4423A64AB7507F1D2968BC1D8B1D0AC2EDE2D075CB4A0332EDEB136EEC0EF9B32CF5A78609F846BF747C06CD522⤵
- Deletes itself
- Executes dropped EXE
PID:1276
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5e3386d6e178b15f9a7224f852af31201
SHA17e1372af317d72f8df613c2ccb4941929d37db8b
SHA25640898378dfe3f436af62b01aba85eb812517f4c564a7028b3ad55fc51b39da89
SHA5127b49611d0f3b02ab1ac04a2f6d30a003eee1fb1a393887aaaa6549e7479830b9d6ae0a66a5fbe9da5586e8699380a9aab71833d9e078d80ce466c194af33102b