Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe
-
Size
3.0MB
-
MD5
4959a0f004b6451a3cf63039a2870b60
-
SHA1
136de801f6802c1afa62c144d12b73a69c91deab
-
SHA256
adae2f147cd1b9b2f48ada429ae9162c23234541466a0f26b85c74bb1302f9d5
-
SHA512
5caa8e5c013b0ec19426183ce530fe2567af3502500aa9b3ed3f68811ca47beaf30dba399beb41a3879f7c3b9117bb23cf5e9a28f25b2cdedb14590262d5cab1
-
SSDEEP
98304:IchA/YvcFtaEkQQQAEXytvZi8eue8RQQW/:IwA/YvcFtaEkQpOfpa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1840 4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1840 4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 pastebin.com 24 pastebin.com -
Program crash 16 IoCs
pid pid_target Process procid_target 2060 1972 WerFault.exe 89 4232 1840 WerFault.exe 94 2784 1840 WerFault.exe 94 4600 1840 WerFault.exe 94 4176 1840 WerFault.exe 94 2796 1840 WerFault.exe 94 2808 1840 WerFault.exe 94 4420 1840 WerFault.exe 94 756 1840 WerFault.exe 94 3736 1840 WerFault.exe 94 4328 1840 WerFault.exe 94 5116 1840 WerFault.exe 94 3568 1840 WerFault.exe 94 3292 1840 WerFault.exe 94 1996 1840 WerFault.exe 94 2372 1840 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1840 4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe 1840 4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1972 4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1840 4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1840 1972 4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe 94 PID 1972 wrote to memory of 1840 1972 4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe 94 PID 1972 wrote to memory of 1840 1972 4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 3442⤵
- Program crash
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\4959a0f004b6451a3cf63039a2870b60_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 3123⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 6363⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 6643⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 6443⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 7203⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 8963⤵
- Program crash
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 14003⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 14483⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 14683⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 15243⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 15363⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 16803⤵
- Program crash
PID:3568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 15203⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 16683⤵
- Program crash
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 6323⤵
- Program crash
PID:2372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1972 -ip 19721⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1840 -ip 18401⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1840 -ip 18401⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1840 -ip 18401⤵PID:2888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1840 -ip 18401⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1840 -ip 18401⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1840 -ip 18401⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1840 -ip 18401⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1840 -ip 18401⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1840 -ip 18401⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1840 -ip 18401⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1840 -ip 18401⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1840 -ip 18401⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1840 -ip 18401⤵PID:2800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1312 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1840 -ip 18401⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1840 -ip 18401⤵PID:4368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD52f9a6c17375fda5f26260f23b486d80d
SHA13aa57a4b95f77d8f4eeeb72e97461ed687de44f7
SHA256f6bacb3d1a8fe73fcb249cd73be01344236ac4a998cb1e5d7df62bca24891a0b
SHA5123b82abb9cb3d6b68584b4607ac5ccbcfad1c1316b892f1e74f09a5fd81b10ff841f6a6a5bbedc666b3597a3508f5cfaf26ac40b216d30fdb262a05d368679997