Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 16:49

General

  • Target

    15148b5c20cc6871db59830914713a90_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    15148b5c20cc6871db59830914713a90

  • SHA1

    3374b9cb923231af082513cc4db7bb0f42e5df75

  • SHA256

    05e5d765b840b10f6752b7562f30b5fcba727a90b9596cdf083c0b2eeaac3363

  • SHA512

    3b55e3d7fb0c97f90aaedb729e4fe5d773dfe3c6df2bc2ea99bbf07558fb61d4efe54123ded843183ba590e66be53f5de491aedbed9bca025ef7f5529c916c41

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+/K:LJ0TAz6Mte4A+aaZx8EnCGVu/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15148b5c20cc6871db59830914713a90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\15148b5c20cc6871db59830914713a90_NeikiAnalytics.exe"
    1⤵
      PID:1508

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-hwwgueslu1dC8EPN.exe

      Filesize

      83KB

      MD5

      eaa3b7356816e25d0bdf9544569cc51f

      SHA1

      db767ba03fcedba13a035de777ce86e421d2986e

      SHA256

      c2bf05195a19a2ae7d40960bfb79e0343910bb80a057d278778f74e47366a9e1

      SHA512

      cd17f742c74ad5704fc610330b037c4fa6f6e163e1160e7687eaaedae4c26e44aa9f58227486654c9e13bf6c6ff0c95f3b82154a2d8ce964fe6b96130f30b835

    • memory/1508-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1508-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1508-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1508-13-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1508-20-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1508-27-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB