Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 06:34

General

  • Target

    c64b63268a8dfd37a6b3ba23a4802330_NeikiAnalytics.exe

  • Size

    34KB

  • MD5

    c64b63268a8dfd37a6b3ba23a4802330

  • SHA1

    42daba7aba98f3ae6633dfb035d3c9fc27113965

  • SHA256

    b39406de82f3409bc7979bec9485a42534fc719cbba35ba487a018ee52a1c070

  • SHA512

    7e6cd2349e1e75371505fc271c2ecab652de40aa2cc54c149955abc56e98c3dc7befff1aaf671cc68f4c1b15c4d1b30335e8c0393dd0429a810084496c7071e6

  • SSDEEP

    768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh9:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wYd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c64b63268a8dfd37a6b3ba23a4802330_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c64b63268a8dfd37a6b3ba23a4802330_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    34KB

    MD5

    d66cffdc853c0d41d577ccff4da0be39

    SHA1

    6eecf492b202832cad46611dff96728460844665

    SHA256

    4cda951d84e3c8835fc931e7623ceb9c3525aaec4c6c9e4cc4737e7153493289

    SHA512

    74a5bbd5cd83967b6bcae85df41cd1152b66d17b89b46c41d8290c799f635522ccabc9260d1818fc9c591d7f081ee2168afe4f1f33641a5ad7968af96d13bca3

  • memory/112-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/112-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1732-8-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB