Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    58s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 19:55 UTC

General

  • Target

    4853887d07f228e60116f831e5776bb0_NeikiAnalytics.exe

  • Size

    497KB

  • MD5

    4853887d07f228e60116f831e5776bb0

  • SHA1

    3f88cd53e9f12eb8224d7b286b8fbc4b67ec6e78

  • SHA256

    b9041f55469df2de66eb03c6d3d2eaba5d62eea51e826a78562acde8cad1ca5d

  • SHA512

    7d0c7a35c2f0de4842e4542c29650e7077ed9b8cdf482f1325f3650cc4bc7e2e6b00e6c172d84d8156ffb402c81b4ec4b5af03bdceea630a5de1c42325a4abd0

  • SSDEEP

    6144:J89MAZjz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayN:+F1gL5pRTcAkS/3hzN8qE43fm78VZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4853887d07f228e60116f831e5776bb0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4853887d07f228e60116f831e5776bb0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1104
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev1529.tmp!C:\Users\Admin\AppData\Local\Temp\4853887d07f228e60116f831e5776bb0_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3296
      • C:\Users\Admin\AppData\Local\Temp\4853887D07F228E60116F831E5776BB0_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2876
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev1529.tmp!C:\Users\Admin\AppData\Local\Temp\4853887D07F228E60116F831E5776BB0_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3952
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4004 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:436

    Network

    • flag-us
      DNS
      255.0.127.10.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      255.0.127.10.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      255.255.255.10.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      255.255.255.10.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      228.249.119.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      228.249.119.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      91.90.14.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      91.90.14.23.in-addr.arpa
      IN PTR
      Response
      91.90.14.23.in-addr.arpa
      IN PTR
      a23-14-90-91deploystaticakamaitechnologiescom
    • flag-us
      DNS
      0.159.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      0.159.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      183.59.114.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      183.59.114.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      183.142.211.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      183.142.211.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      15.164.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      15.164.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      154.239.44.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      154.239.44.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      240.221.184.93.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      240.221.184.93.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      30.243.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      30.243.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      chromewebstore.googleapis.com
      Remote address:
      8.8.8.8:53
      Request
      chromewebstore.googleapis.com
      IN A
      Response
      chromewebstore.googleapis.com
      IN A
      142.250.179.74
      chromewebstore.googleapis.com
      IN A
      142.250.179.106
      chromewebstore.googleapis.com
      IN A
      142.250.178.138
      chromewebstore.googleapis.com
      IN A
      142.250.201.170
      chromewebstore.googleapis.com
      IN A
      172.217.18.202
      chromewebstore.googleapis.com
      IN A
      216.58.214.74
      chromewebstore.googleapis.com
      IN A
      142.250.74.234
      chromewebstore.googleapis.com
      IN A
      142.250.75.234
      chromewebstore.googleapis.com
      IN A
      216.58.214.170
      chromewebstore.googleapis.com
      IN A
      172.217.20.170
      chromewebstore.googleapis.com
      IN A
      172.217.20.202
      chromewebstore.googleapis.com
      IN A
      216.58.215.42
      chromewebstore.googleapis.com
      IN A
      216.58.213.74
    • flag-us
      DNS
      chromewebstore.googleapis.com
      Remote address:
      8.8.8.8:53
      Request
      chromewebstore.googleapis.com
      IN Unknown
      Response
    • flag-us
      DNS
      74.179.250.142.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      74.179.250.142.in-addr.arpa
      IN PTR
      Response
      74.179.250.142.in-addr.arpa
      IN PTR
      par21s19-in-f101e100net
    • flag-us
      DNS
      16.173.189.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      16.173.189.20.in-addr.arpa
      IN PTR
      Response
    • 142.250.179.74:443
      chromewebstore.googleapis.com
      tls
      1.9kB
      7.9kB
      15
      16
    • 10.127.255.255:78
      MSWDM.EXE
      46 B
      1
    • 10.255.255.255:78
      MSWDM.EXE
      46 B
      1
    • 10.127.0.255:78
      MSWDM.EXE
      46 B
      1
    • 8.8.8.8:53
      255.0.127.10.in-addr.arpa
      dns
      71 B
      71 B
      1
      1

      DNS Request

      255.0.127.10.in-addr.arpa

    • 8.8.8.8:53
      255.255.255.10.in-addr.arpa
      dns
      73 B
      73 B
      1
      1

      DNS Request

      255.255.255.10.in-addr.arpa

    • 8.8.8.8:53
      228.249.119.40.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      228.249.119.40.in-addr.arpa

    • 8.8.8.8:53
      91.90.14.23.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      91.90.14.23.in-addr.arpa

    • 8.8.8.8:53
      0.159.190.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      0.159.190.20.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      183.59.114.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      183.59.114.20.in-addr.arpa

    • 8.8.8.8:53
      183.142.211.20.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      183.142.211.20.in-addr.arpa

    • 8.8.8.8:53
      15.164.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      15.164.165.52.in-addr.arpa

    • 8.8.8.8:53
      154.239.44.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      154.239.44.20.in-addr.arpa

    • 8.8.8.8:53
      240.221.184.93.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      240.221.184.93.in-addr.arpa

    • 8.8.8.8:53
      30.243.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      30.243.111.52.in-addr.arpa

    • 8.8.8.8:53
      chromewebstore.googleapis.com
      dns
      75 B
      283 B
      1
      1

      DNS Request

      chromewebstore.googleapis.com

      DNS Response

      142.250.179.74
      142.250.179.106
      142.250.178.138
      142.250.201.170
      172.217.18.202
      216.58.214.74
      142.250.74.234
      142.250.75.234
      216.58.214.170
      172.217.20.170
      172.217.20.202
      216.58.215.42
      216.58.213.74

    • 8.8.8.8:53
      chromewebstore.googleapis.com
      dns
      75 B
      132 B
      1
      1

      DNS Request

      chromewebstore.googleapis.com

    • 8.8.8.8:53
      74.179.250.142.in-addr.arpa
      dns
      73 B
      112 B
      1
      1

      DNS Request

      74.179.250.142.in-addr.arpa

    • 8.8.8.8:53
      16.173.189.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      16.173.189.20.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\4853887D07F228E60116F831E5776BB0_NEIKIANALYTICS.EXE

      Filesize

      497KB

      MD5

      3e8d367ca8b7facbca26b84a35527e15

      SHA1

      d550e76bb03312d658267c73a5bbef45e3535be6

      SHA256

      b8832c05d3cdaa9ea0a52cb79cf16790ca7ed52a1185d0f2278ef86814a92126

      SHA512

      ecd2a892930687e0d3378da9b4bca2023d661009e29ea04269509dd59311bdd8b77d2607af0e96f395246753d895585942ce2a2101daccb6a88880852a46356d

    • C:\Windows\MSWDM.EXE

      Filesize

      39KB

      MD5

      fcdbf839561963c0153432aafb2edd88

      SHA1

      d34b2c4fd725774f93d34ce411caee8a72c3cd46

      SHA256

      fd42fb02fe0e758cff209dabd8916a27cc9ae96632cb491eb0d484410a91f127

      SHA512

      f2e8e8257b26981cb6baf0d52d20f16ca5ed9649c4447da631a362261bbc933ab4255b9dbedc6e5852bf2c01bb5fd8d43d7b72d0457fb927713a1e35602d5c07

    • C:\Windows\dev1529.tmp

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • memory/1104-23-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/1104-24-0x00000000004F0000-0x00000000004F6000-memory.dmp

      Filesize

      24KB

    • memory/2348-0-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/2348-1-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/2348-9-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/3296-22-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/3952-19-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.