Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 01:30

General

  • Target

    4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe

  • Size

    3.0MB

  • MD5

    4959a0f004b6451a3cf63039a2870b60

  • SHA1

    136de801f6802c1afa62c144d12b73a69c91deab

  • SHA256

    adae2f147cd1b9b2f48ada429ae9162c23234541466a0f26b85c74bb1302f9d5

  • SHA512

    5caa8e5c013b0ec19426183ce530fe2567af3502500aa9b3ed3f68811ca47beaf30dba399beb41a3879f7c3b9117bb23cf5e9a28f25b2cdedb14590262d5cab1

  • SSDEEP

    98304:IchA/YvcFtaEkQQQAEXytvZi8eue8RQQW/:IwA/YvcFtaEkQpOfpa

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Program crash 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 344
      2⤵
      • Program crash
      PID:2060
    • C:\Users\Admin\AppData\Local\Temp\4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:1840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 312
        3⤵
        • Program crash
        PID:4232
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 636
        3⤵
        • Program crash
        PID:2784
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 664
        3⤵
        • Program crash
        PID:4600
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 644
        3⤵
        • Program crash
        PID:4176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 720
        3⤵
        • Program crash
        PID:2796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 896
        3⤵
        • Program crash
        PID:2808
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1400
        3⤵
        • Program crash
        PID:4420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1448
        3⤵
        • Program crash
        PID:756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1468
        3⤵
        • Program crash
        PID:3736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1524
        3⤵
        • Program crash
        PID:4328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1536
        3⤵
        • Program crash
        PID:5116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1680
        3⤵
        • Program crash
        PID:3568
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1520
        3⤵
        • Program crash
        PID:3292
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1668
        3⤵
        • Program crash
        PID:1996
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 632
        3⤵
        • Program crash
        PID:2372
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1972 -ip 1972
    1⤵
      PID:4616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1840 -ip 1840
      1⤵
        PID:1680
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1840 -ip 1840
        1⤵
          PID:1548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1840 -ip 1840
          1⤵
            PID:2888
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1840 -ip 1840
            1⤵
              PID:2168
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1840 -ip 1840
              1⤵
                PID:1144
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1840 -ip 1840
                1⤵
                  PID:3552
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1840 -ip 1840
                  1⤵
                    PID:2660
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1840 -ip 1840
                    1⤵
                      PID:1324
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1840 -ip 1840
                      1⤵
                        PID:3404
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1840 -ip 1840
                        1⤵
                          PID:4916
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1840 -ip 1840
                          1⤵
                            PID:4452
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1840 -ip 1840
                            1⤵
                              PID:4616
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1840 -ip 1840
                              1⤵
                                PID:2800
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1312 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
                                1⤵
                                  PID:1724
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1840 -ip 1840
                                  1⤵
                                    PID:4944
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1840 -ip 1840
                                    1⤵
                                      PID:4368

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe

                                      Filesize

                                      3.0MB

                                      MD5

                                      2f9a6c17375fda5f26260f23b486d80d

                                      SHA1

                                      3aa57a4b95f77d8f4eeeb72e97461ed687de44f7

                                      SHA256

                                      f6bacb3d1a8fe73fcb249cd73be01344236ac4a998cb1e5d7df62bca24891a0b

                                      SHA512

                                      3b82abb9cb3d6b68584b4607ac5ccbcfad1c1316b892f1e74f09a5fd81b10ff841f6a6a5bbedc666b3597a3508f5cfaf26ac40b216d30fdb262a05d368679997

                                    • memory/1840-7-0x0000000000400000-0x00000000004F1000-memory.dmp

                                      Filesize

                                      964KB

                                    • memory/1840-8-0x0000000004F60000-0x0000000005051000-memory.dmp

                                      Filesize

                                      964KB

                                    • memory/1840-10-0x0000000000400000-0x00000000004A3000-memory.dmp

                                      Filesize

                                      652KB

                                    • memory/1840-21-0x0000000000400000-0x0000000000443000-memory.dmp

                                      Filesize

                                      268KB

                                    • memory/1840-27-0x000000000DA80000-0x000000000DB23000-memory.dmp

                                      Filesize

                                      652KB

                                    • memory/1972-0-0x0000000000400000-0x00000000004F1000-memory.dmp

                                      Filesize

                                      964KB

                                    • memory/1972-6-0x0000000000400000-0x00000000004F1000-memory.dmp

                                      Filesize

                                      964KB