Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
762afd15a858fd131aeaf161b68f6790_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
762afd15a858fd131aeaf161b68f6790_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
762afd15a858fd131aeaf161b68f6790_NeikiAnalytics.exe
-
Size
73KB
-
MD5
762afd15a858fd131aeaf161b68f6790
-
SHA1
c4b8a81a719f50139d29bac58cbfb7a0cea0c194
-
SHA256
10d6a69927d98237bdde0af0fb5413f3b7348503b2cd0ecc99ee86740993c465
-
SHA512
08b950647c5343afa0e399ea4874a1509cae8e93fb13af22017f1d9f6c33c39f9f008b38e4b3f5eaaf58ee998cb61fed1cfa62a9750961ace8ec8acd8e566b07
-
SSDEEP
1536:hbXSUzRv0EK5QPqfhVWbdsmA+RjPFLC+e5hqQ0ZGUGf2g:hrz7NPqfcxA+HFshvOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4072 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4064 wrote to memory of 1168 4064 762afd15a858fd131aeaf161b68f6790_NeikiAnalytics.exe 84 PID 4064 wrote to memory of 1168 4064 762afd15a858fd131aeaf161b68f6790_NeikiAnalytics.exe 84 PID 4064 wrote to memory of 1168 4064 762afd15a858fd131aeaf161b68f6790_NeikiAnalytics.exe 84 PID 1168 wrote to memory of 4072 1168 cmd.exe 85 PID 1168 wrote to memory of 4072 1168 cmd.exe 85 PID 1168 wrote to memory of 4072 1168 cmd.exe 85 PID 4072 wrote to memory of 4600 4072 [email protected] 86 PID 4072 wrote to memory of 4600 4072 [email protected] 86 PID 4072 wrote to memory of 4600 4072 [email protected] 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\762afd15a858fd131aeaf161b68f6790_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\762afd15a858fd131aeaf161b68f6790_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\cmd.exePID:1168
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:4600
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5c65f730c2dac6556dd2e3f7ec32cdb79
SHA1a77abf1dcdf0e0e7f766342ec9736bbbe8dba530
SHA25681066834923488b562c0dee7c2b35e3c98672b0f767c8bdafb19f97158808f68
SHA512694de31824cafcd31152eb35e084ff37f289c9f9a28ff015042af030534385270f97e8916b3ab9a8d1c9f3cb9b3c87d7f99818434453018a9e02ad1234d9cc42
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1