Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 13:12

General

  • Target

    527e92a9be8445ba27a182020e03218d49cb12bafdfb5fd975c2630881042acc_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    70db220c353480863ece0e0f0ca18bb0

  • SHA1

    d3188ac78075ac970a76055d75e27cd47ecba08c

  • SHA256

    527e92a9be8445ba27a182020e03218d49cb12bafdfb5fd975c2630881042acc

  • SHA512

    87ef8cfd4d3e204340edb445d095bf867e59af691dabad43705e98b32e9744a9c1dcdc04bda24e247b5e235de8cd6bac49a711fe308f5c182f27c881948b8ec2

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rK:LJ0TAz6Mte4A+aaZx8EnCGVur

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\527e92a9be8445ba27a182020e03218d49cb12bafdfb5fd975c2630881042acc_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\527e92a9be8445ba27a182020e03218d49cb12bafdfb5fd975c2630881042acc_NeikiAnalytics.exe"
    1⤵
      PID:1468

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-ayGlL7fQKPfhrYFN.exe

      Filesize

      83KB

      MD5

      1a905a34f1721aab447fb38b58c714ca

      SHA1

      4803df4fbf6729c7d1fa807956157c74273b18ce

      SHA256

      a7f06b42394314c5a0e31bf3085cdc1b375b38176e17267c0845562f52e4ee67

      SHA512

      d1e2f0f147a2cfa304b8bd3e8318f70dc951bf37a3c1024c81c44dc6fb9590b654c7df8cc46fc4a7ee9d3484cdea25621fc79ac0f1f4219fdf853baa68a7c797

    • memory/1468-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB