Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 08:25 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5a776d9325582a8eba6d08b8e4ae2260_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5a776d9325582a8eba6d08b8e4ae2260_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5a776d9325582a8eba6d08b8e4ae2260_NeikiAnalytics.exe
-
Size
79KB
-
MD5
5a776d9325582a8eba6d08b8e4ae2260
-
SHA1
4d8b45b7de4804121616debf527e665ada169ee5
-
SHA256
4b63dc3c8e90ef095989e53256a8b7f990c0db28c2a11e2fba23313723f85873
-
SHA512
b8fd65d9e5b4d557becbd7fa45a5982620503b6cdc172178224894b2c8ce4a4f67a90c26114d056b5c73474a0925ee19edf709a5eafeae8fab47aa7231d8e3c6
-
SSDEEP
1536:zvE4jn835XRvWOQA8AkqUhMb2nuy5wgIP0CSJ+5yiB8GMGlZ5G:zvLj8RRrGdqU7uy5w9WMyiN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 $TMP!10@.COM -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2172 1936 5a776d9325582a8eba6d08b8e4ae2260_NeikiAnalytics.exe 83 PID 1936 wrote to memory of 2172 1936 5a776d9325582a8eba6d08b8e4ae2260_NeikiAnalytics.exe 83 PID 1936 wrote to memory of 2172 1936 5a776d9325582a8eba6d08b8e4ae2260_NeikiAnalytics.exe 83 PID 2172 wrote to memory of 2268 2172 cmd.exe 84 PID 2172 wrote to memory of 2268 2172 cmd.exe 84 PID 2172 wrote to memory of 2268 2172 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a776d9325582a8eba6d08b8e4ae2260_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5a776d9325582a8eba6d08b8e4ae2260_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c $TMP!10@.COM2⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\$TMP!10@.COM$TMP!10@.COM3⤵
- Executes dropped EXE
PID:2268
-
-
Network
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request25.24.18.2.in-addr.arpaIN PTRResponse25.24.18.2.in-addr.arpaIN PTRa2-18-24-25deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.204.248.87.in-addr.arpaIN PTRResponse0.204.248.87.in-addr.arpaIN PTRhttps-87-248-204-0lhrllnwnet
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
25.24.18.2.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.204.248.87.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD56d4b360221d7561196a87184fcae9fb5
SHA16fd8c4ee41f2dd4624382e77e98e9a8f67c3a3c8
SHA2568d602ac47c3d9eea48a1879f8e73c6059176f912d9eadc98da4556bb53cdbd8e
SHA512963d93449512be18ab7e1c41a2cbe6868d2a9c4597072ab43642d23af887cdd0f797cd5c432fefbc8b98fa2b9cbfe0fc0e9297da7b9d7c96adf75a7acc7b204d