Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
0d0946d8e8dfd74b97735005717d55c0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0d0946d8e8dfd74b97735005717d55c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0d0946d8e8dfd74b97735005717d55c0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
0d0946d8e8dfd74b97735005717d55c0
-
SHA1
d89eebd94faaf27ae80c52d2e98ab033481ea4e4
-
SHA256
01c143677ef0bced816120c4230f932cbfc6b823113997cfd6410910c27c1b05
-
SHA512
e88798669e9d2ad982696da8c4403c949502256fd969e098e0368536671c011145dfd100f9a6e6fc80a841c893719e5b691dad2dbf0f1aafde3cdacb34d16941
-
SSDEEP
1536:zvgM2E1o/OQA8AkqUhMb2nuy5wgIP0CSJ+5yZB8GMGlZ5G:zvgMa2GdqU7uy5w9WMyZN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4652 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3524 wrote to memory of 2800 3524 0d0946d8e8dfd74b97735005717d55c0_NeikiAnalytics.exe 85 PID 3524 wrote to memory of 2800 3524 0d0946d8e8dfd74b97735005717d55c0_NeikiAnalytics.exe 85 PID 3524 wrote to memory of 2800 3524 0d0946d8e8dfd74b97735005717d55c0_NeikiAnalytics.exe 85 PID 2800 wrote to memory of 4652 2800 cmd.exe 86 PID 2800 wrote to memory of 4652 2800 cmd.exe 86 PID 2800 wrote to memory of 4652 2800 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d0946d8e8dfd74b97735005717d55c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0d0946d8e8dfd74b97735005717d55c0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\cmd.exePID:2800
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4652
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD55eccd6fa246970926ec0605ffadb3955
SHA195d43da2224c46ea298b13bd65087a677cd82263
SHA256e485d67366d6d26825898326c63bee850555562b6333d0eb2a20cff39b3c1ff7
SHA512543c7143f2aa53cec8d5dee155e3c98f0c6e436da5d069a89f1f7457d44023e71864e1eee7c966f7b410969da7fa5e8aca2bdc53690a306fd818cc2ce5da8362