Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
1b5f72e016c846bdcfa200c6e73e3520_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b5f72e016c846bdcfa200c6e73e3520_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1b5f72e016c846bdcfa200c6e73e3520_NeikiAnalytics.exe
-
Size
73KB
-
MD5
1b5f72e016c846bdcfa200c6e73e3520
-
SHA1
74fa6ba2df6dd1846b54d73d8706ae8e0e42bf81
-
SHA256
4b480b67e6c6a52523996237ec32eadff33cc09262b59a8c30c20057d96ee393
-
SHA512
b3f14c37d043f7745c2713202e2c2280067fef7405783727bdbb0a8dde1c7f195fc7fed5dc30d35e530b79d2960490268df4fdd890d504ed8ea2ef6946b5639a
-
SSDEEP
1536:hbO0llp4JuLK5QPqfhVWbdsmA+RjPFLC+e5hG0ZGUGf2g:hTlp4WNPqfcxA+HFshGOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2896 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2512 cmd.exe 2512 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2512 1736 1b5f72e016c846bdcfa200c6e73e3520_NeikiAnalytics.exe 29 PID 1736 wrote to memory of 2512 1736 1b5f72e016c846bdcfa200c6e73e3520_NeikiAnalytics.exe 29 PID 1736 wrote to memory of 2512 1736 1b5f72e016c846bdcfa200c6e73e3520_NeikiAnalytics.exe 29 PID 1736 wrote to memory of 2512 1736 1b5f72e016c846bdcfa200c6e73e3520_NeikiAnalytics.exe 29 PID 2512 wrote to memory of 2896 2512 cmd.exe 30 PID 2512 wrote to memory of 2896 2512 cmd.exe 30 PID 2512 wrote to memory of 2896 2512 cmd.exe 30 PID 2512 wrote to memory of 2896 2512 cmd.exe 30 PID 2896 wrote to memory of 2568 2896 [email protected] 31 PID 2896 wrote to memory of 2568 2896 [email protected] 31 PID 2896 wrote to memory of 2568 2896 [email protected] 31 PID 2896 wrote to memory of 2568 2896 [email protected] 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b5f72e016c846bdcfa200c6e73e3520_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b5f72e016c846bdcfa200c6e73e3520_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2568
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5340adf64bbd23c23f08f7247061446a8
SHA128f64d9c87a4e97278ddfce3392ad52322edfc8f
SHA25663a75c9d4598f4c87f2dfdb2400adb03b4cb9d26656d1cd274215196ea94d667
SHA5129d0015a699626496bb5d0bd235cdc8c47014c7d6b7bd69263bd18ce23f8c4ee759aa22fd216394fe41b96db25dc83419c327d166b82e5b9068380010c94b297a