Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
c6161aa76f806aafc1c1a9f171afd6c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6161aa76f806aafc1c1a9f171afd6c0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
c6161aa76f806aafc1c1a9f171afd6c0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
c6161aa76f806aafc1c1a9f171afd6c0
-
SHA1
96c829f2a9b83b971183fedbd20443e5a37f08e1
-
SHA256
a7589fa55f577c4ce07d1eaaa169ae49755a86d5d793d0d1ae52a2022d93dff1
-
SHA512
6e1db51788828c3679c78963ed25bb76cc712d86dedbd012afad95ddf00107242b5827c39a6ab31cec97cd9437b14a0f1aa3c25a6ec32558b5319e06594aa4e4
-
SSDEEP
1536:zvT7GBZqOQA8AkqUhMb2nuy5wgIP0CSJ+5y3B8GMGlZ5G:zvT7YfGdqU7uy5w9WMy3N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 592 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 528 cmd.exe 528 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 528 2148 c6161aa76f806aafc1c1a9f171afd6c0_NeikiAnalytics.exe 29 PID 2148 wrote to memory of 528 2148 c6161aa76f806aafc1c1a9f171afd6c0_NeikiAnalytics.exe 29 PID 2148 wrote to memory of 528 2148 c6161aa76f806aafc1c1a9f171afd6c0_NeikiAnalytics.exe 29 PID 2148 wrote to memory of 528 2148 c6161aa76f806aafc1c1a9f171afd6c0_NeikiAnalytics.exe 29 PID 528 wrote to memory of 592 528 cmd.exe 30 PID 528 wrote to memory of 592 528 cmd.exe 30 PID 528 wrote to memory of 592 528 cmd.exe 30 PID 528 wrote to memory of 592 528 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6161aa76f806aafc1c1a9f171afd6c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c6161aa76f806aafc1c1a9f171afd6c0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:592
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5a9d5991de0a96de4610f8143caa565cd
SHA13e0ab984031d7e3ea08af8f9e1e31d206a57a0e8
SHA256addbb0ab79617bb703469606fefe4206c053959d445bb33ec6865aee79e71bdb
SHA5126c49cd915489e7750357afea5da84946444174158574261614afda769b789140d974d9ef55a4a92fa8bb5cf3242a6034ecb7505f117cdfd47f61d6da209222bb