Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 14:46 UTC
Static task
static1
Behavioral task
behavioral1
Sample
0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe
-
Size
73KB
-
MD5
0a8bc79f0106e422496850b3c894dc20
-
SHA1
2b9d71452599f1b9472b6561696a58d4100314db
-
SHA256
f8b671ba5c2120d917197934c38e610dab5d00aab6a7c52c0973ecb91e533715
-
SHA512
f79a8cc20eb7d6a7a512c332a4c9dade86527e9b90d931fd445be870cfea5620f233bc47518e9dd921eff4ef6de414bfc3a4c4b7e5e4a24fd8ecc65e6422e865
-
SSDEEP
1536:hbyfGPRcsfK5QPqfhVWbdsmA+RjPFLC+e5h+0ZGUGf2g:h+fG9NPqfcxA+HFsh+Og
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 $TMP!10@.COM -
Loads dropped DLL 2 IoCs
pid Process 2036 cmd.exe 2036 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2036 1688 0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe 29 PID 1688 wrote to memory of 2036 1688 0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe 29 PID 1688 wrote to memory of 2036 1688 0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe 29 PID 1688 wrote to memory of 2036 1688 0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe 29 PID 2036 wrote to memory of 2028 2036 cmd.exe 30 PID 2036 wrote to memory of 2028 2036 cmd.exe 30 PID 2036 wrote to memory of 2028 2036 cmd.exe 30 PID 2036 wrote to memory of 2028 2036 cmd.exe 30 PID 2028 wrote to memory of 2068 2028 $TMP!10@.COM 31 PID 2028 wrote to memory of 2068 2028 $TMP!10@.COM 31 PID 2028 wrote to memory of 2068 2028 $TMP!10@.COM 31 PID 2028 wrote to memory of 2068 2028 $TMP!10@.COM 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c $TMP!10@.COM2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\$TMP!10@.COM$TMP!10@.COM3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2068
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5dd3152bca970d2fc490cba19ed58ee4f
SHA1174dc7e4f3ed4a779afd960621f58abcd798ff83
SHA2566ee01c7e6fa788cfb2fcfbe7367993da4cce6b5a6b426bb5b965f58f9219a305
SHA512048a5d9d47ba1cf2666a03d1d743e9a323d46b83261344afa200e55d4c14fa4d9885ce464155ba6a4624cb717cba5f7e5e19a16234a4343ecbe2483f2acbae03