Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe
-
Size
73KB
-
MD5
0a8bc79f0106e422496850b3c894dc20
-
SHA1
2b9d71452599f1b9472b6561696a58d4100314db
-
SHA256
f8b671ba5c2120d917197934c38e610dab5d00aab6a7c52c0973ecb91e533715
-
SHA512
f79a8cc20eb7d6a7a512c332a4c9dade86527e9b90d931fd445be870cfea5620f233bc47518e9dd921eff4ef6de414bfc3a4c4b7e5e4a24fd8ecc65e6422e865
-
SSDEEP
1536:hbyfGPRcsfK5QPqfhVWbdsmA+RjPFLC+e5h+0ZGUGf2g:h+fG9NPqfcxA+HFsh+Og
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1468 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3856 wrote to memory of 2360 3856 0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe 85 PID 3856 wrote to memory of 2360 3856 0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe 85 PID 3856 wrote to memory of 2360 3856 0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe 85 PID 2360 wrote to memory of 1468 2360 cmd.exe 86 PID 2360 wrote to memory of 1468 2360 cmd.exe 86 PID 2360 wrote to memory of 1468 2360 cmd.exe 86 PID 1468 wrote to memory of 2840 1468 [email protected] 87 PID 1468 wrote to memory of 2840 1468 [email protected] 87 PID 1468 wrote to memory of 2840 1468 [email protected] 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0a8bc79f0106e422496850b3c894dc20_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\cmd.exePID:2360
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2840
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5dd3152bca970d2fc490cba19ed58ee4f
SHA1174dc7e4f3ed4a779afd960621f58abcd798ff83
SHA2566ee01c7e6fa788cfb2fcfbe7367993da4cce6b5a6b426bb5b965f58f9219a305
SHA512048a5d9d47ba1cf2666a03d1d743e9a323d46b83261344afa200e55d4c14fa4d9885ce464155ba6a4624cb717cba5f7e5e19a16234a4343ecbe2483f2acbae03
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1