Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe
-
Size
73KB
-
MD5
54937998eea25c8fcb0aedfac2604b00
-
SHA1
cadff22a940caf2d9d97debb06c78e961b010405
-
SHA256
fdfabd0dff64f3db777909cdf881fe2ee673cf06bb8954c80376faad09a99636
-
SHA512
b103119b53921850a237d5348f5b2acc590d1bae12c7330ab068985d8a7ca018146e80ca7e8b25470f8c493f1cc1882602e76575fa28b45d065db91f71bae036
-
SSDEEP
1536:hbcXhCvalcXK5QPqfhVWbdsmA+RjPFLC+e5hPT0ZGUGf2g:hnNPqfcxA+HFshPTOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2920 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2748 cmd.exe 2748 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2748 2508 54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe 29 PID 2508 wrote to memory of 2748 2508 54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe 29 PID 2508 wrote to memory of 2748 2508 54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe 29 PID 2508 wrote to memory of 2748 2508 54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe 29 PID 2748 wrote to memory of 2920 2748 cmd.exe 30 PID 2748 wrote to memory of 2920 2748 cmd.exe 30 PID 2748 wrote to memory of 2920 2748 cmd.exe 30 PID 2748 wrote to memory of 2920 2748 cmd.exe 30 PID 2920 wrote to memory of 2532 2920 [email protected] 31 PID 2920 wrote to memory of 2532 2920 [email protected] 31 PID 2920 wrote to memory of 2532 2920 [email protected] 31 PID 2920 wrote to memory of 2532 2920 [email protected] 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2532
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD58850ed3a23a0b4014c04da4d49c83490
SHA1438fcb31cfe9430b2add95580193bbe1965b11a2
SHA256f683dee81b366e4782566808b3b7a26f8211260a9234b262b4493f676c23bec1
SHA5123de4d0247107a8265304a75181a85a6f4a9d20fbb15358343f39017f767800190fdf7a3bc9c968a44ca9e2ffff700fe666615555b061722ab616e6e97d3b81fe