Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
cd50a4dc36a7b5e8423ef07878768720_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd50a4dc36a7b5e8423ef07878768720_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
cd50a4dc36a7b5e8423ef07878768720_NeikiAnalytics.exe
-
Size
79KB
-
MD5
cd50a4dc36a7b5e8423ef07878768720
-
SHA1
2ca62e77459c9a19f981c4c05b61b1319c15f008
-
SHA256
014bf438f5fe87b881ddaca79b72fdca0e01556fee19afb58d0adb7cfe27ed25
-
SHA512
2c33f9c6b451e87ce83834e5c964b8d8c66c020ff1d960223f9151ad5f5ca1ce99440ec349441ea8324f7702593c72727444bf5870ea23fd1d4d01f0224d58b4
-
SSDEEP
1536:zv3yCHpuHMR5KOQA8AkqUhMb2nuy5wgIP0CSJ+5yMB8GMGlZ5G:zvi0uHM3/GdqU7uy5w9WMyMN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 904 wrote to memory of 2008 904 cd50a4dc36a7b5e8423ef07878768720_NeikiAnalytics.exe 84 PID 904 wrote to memory of 2008 904 cd50a4dc36a7b5e8423ef07878768720_NeikiAnalytics.exe 84 PID 904 wrote to memory of 2008 904 cd50a4dc36a7b5e8423ef07878768720_NeikiAnalytics.exe 84 PID 2008 wrote to memory of 2084 2008 cmd.exe 85 PID 2008 wrote to memory of 2084 2008 cmd.exe 85 PID 2008 wrote to memory of 2084 2008 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd50a4dc36a7b5e8423ef07878768720_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\cd50a4dc36a7b5e8423ef07878768720_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.exePID:2008
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2084
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD594208e3689d5c2a10735f846e27f5af8
SHA1cb4d0682934ef079d157f99c8a8ff05af82e2612
SHA2563142402cf8a5e5aa6c930c154f90dbff8a5542fa79d0d5212c315b9308f4a907
SHA512730ce5848c71f9cf28806249402721c01a141fe953246bb17c17fe50d8d16e3b77c0dd14d492000520a74b2a31cb3e03de134a47c04b804aa05255fb6a3a2fc7