Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
46929b38630978dbfb4cba90908abfc0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
46929b38630978dbfb4cba90908abfc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
46929b38630978dbfb4cba90908abfc0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
46929b38630978dbfb4cba90908abfc0
-
SHA1
69f43c1f8d5ae6f38c19c9f302ce3d4bf98b9e17
-
SHA256
46c840933f67b603d84b1682d0fdabd315ab18bf933f0f7471ab9efd70885df4
-
SHA512
d2a90e5f387638e599e252a5142f3efebce968a7940d043e74299fda01d2254c6cf5967dffbe2bade196f74426c3834486a32f825feeda80631de472d078c5d8
-
SSDEEP
1536:zvjIGSEX0E9jPOQA8AkqUhMb2nuy5wgIP0CSJ+5y/B8GMGlZ5G:zvjSFsmGdqU7uy5w9WMy/N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1804 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2192 cmd.exe 2192 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 352 wrote to memory of 2192 352 46929b38630978dbfb4cba90908abfc0_NeikiAnalytics.exe 29 PID 352 wrote to memory of 2192 352 46929b38630978dbfb4cba90908abfc0_NeikiAnalytics.exe 29 PID 352 wrote to memory of 2192 352 46929b38630978dbfb4cba90908abfc0_NeikiAnalytics.exe 29 PID 352 wrote to memory of 2192 352 46929b38630978dbfb4cba90908abfc0_NeikiAnalytics.exe 29 PID 2192 wrote to memory of 1804 2192 cmd.exe 30 PID 2192 wrote to memory of 1804 2192 cmd.exe 30 PID 2192 wrote to memory of 1804 2192 cmd.exe 30 PID 2192 wrote to memory of 1804 2192 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\46929b38630978dbfb4cba90908abfc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\46929b38630978dbfb4cba90908abfc0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1804
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5a78750f81a30d1da16ac90088b691443
SHA15e6c6fc526de373c9fc497642328314718897028
SHA25688b8b5b79cc4637351586c8970ea4b1da5c2024ce8106928ab3726115f8fc177
SHA51257b79428e2cd400d225c3bfa756b14453890ec5b45467bc6d7e741a8ac3af3a838c9c5dc3b6a7f4cf9618b431e3b6a8172a0f31daa023118cd5eb19a982cdab8