Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 14:46 UTC

General

  • Target

    0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe

  • Size

    73KB

  • MD5

    0a8bc79f0106e422496850b3c894dc20

  • SHA1

    2b9d71452599f1b9472b6561696a58d4100314db

  • SHA256

    f8b671ba5c2120d917197934c38e610dab5d00aab6a7c52c0973ecb91e533715

  • SHA512

    f79a8cc20eb7d6a7a512c332a4c9dade86527e9b90d931fd445be870cfea5620f233bc47518e9dd921eff4ef6de414bfc3a4c4b7e5e4a24fd8ecc65e6422e865

  • SSDEEP

    1536:hbyfGPRcsfK5QPqfhVWbdsmA+RjPFLC+e5h+0ZGUGf2g:h+fG9NPqfcxA+HFsh+Og

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c $TMP!10@.COM
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\$TMP!10@.COM
        $TMP!10@.COM
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c 00.exe
          4⤵
            PID:2068

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\$TMP!10@.COM

      Filesize

      73KB

      MD5

      dd3152bca970d2fc490cba19ed58ee4f

      SHA1

      174dc7e4f3ed4a779afd960621f58abcd798ff83

      SHA256

      6ee01c7e6fa788cfb2fcfbe7367993da4cce6b5a6b426bb5b965f58f9219a305

      SHA512

      048a5d9d47ba1cf2666a03d1d743e9a323d46b83261344afa200e55d4c14fa4d9885ce464155ba6a4624cb717cba5f7e5e19a16234a4343ecbe2483f2acbae03

    • memory/1688-11-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/2028-10-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.