Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe
-
Size
928KB
-
MD5
1ad098ff180cdec1ef320c666c931650
-
SHA1
93fb520b4fa31783699e8035efeac920306b9d60
-
SHA256
53b84989e9478e90960e8aa69127f56cce6fcbfc5406a008ae42471c949c614d
-
SHA512
edee9f2a2c420b9485064e2ff4bcdc884bf7aebc0f9cd512f4ae6825f067630dc70ef217fe7fddc07b2abb5b200b7132cfa200318885fa3a6dfc4d3a943b3c0f
-
SSDEEP
24576:UdlsaUea64xHvqh5AZo8UUMpvATxCPV8DXTFDSAdEELdDDDCDaD3fXN0VI5sPSTd:Udlva64xHSh5AZo8UUM5MxCPVuXTFDSu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2728 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2728 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1688 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2728 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2728 1688 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe 29 PID 1688 wrote to memory of 2728 1688 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe 29 PID 1688 wrote to memory of 2728 1688 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe 29 PID 1688 wrote to memory of 2728 1688 1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\1ad098ff180cdec1ef320c666c931650_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
928KB
MD506a5d48aaf226ffb71ba1954506007b0
SHA1aec7c3103bead9de4dfba68c64fcbaa8c5b5cfcf
SHA256b5f7b9756a5645cf3caeff5d7c2d06e1b5229718b1103a9f9aef08792685db4e
SHA51207ab41934153f9e08dba1bcfc24c7512c032389cd73baea931417f8e1ce2a0e5602a867d9920c84a7b234508bfb56561802fa087bfdc22fcd79cc505123f4618