Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
0b2a0d9b41e03f2b5069f31c0ba2eeb0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b2a0d9b41e03f2b5069f31c0ba2eeb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0b2a0d9b41e03f2b5069f31c0ba2eeb0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
0b2a0d9b41e03f2b5069f31c0ba2eeb0
-
SHA1
988c8f0b55de4bda39c2237ff8251ffe1171cf11
-
SHA256
41690f940026a43edd35d95c1bdf0ddb0d78b6690070265a932b114961109eb8
-
SHA512
385d759d8c00287d29f3dd9a61864501b1d8ff3c49d731d6da77e63d63e3b8d0fa3056331a82f2752ada21e1450a053d88db9d52b22fdbf59550b6b97c785ce2
-
SSDEEP
1536:zvSKKHfuaJOwqOQA8AkqUhMb2nuy5wgIP0CSJ+5yLB8GMGlZ5G:zviHfuXwfGdqU7uy5w9WMyLN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2284 cmd.exe 2284 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2284 1712 0b2a0d9b41e03f2b5069f31c0ba2eeb0_NeikiAnalytics.exe 29 PID 1712 wrote to memory of 2284 1712 0b2a0d9b41e03f2b5069f31c0ba2eeb0_NeikiAnalytics.exe 29 PID 1712 wrote to memory of 2284 1712 0b2a0d9b41e03f2b5069f31c0ba2eeb0_NeikiAnalytics.exe 29 PID 1712 wrote to memory of 2284 1712 0b2a0d9b41e03f2b5069f31c0ba2eeb0_NeikiAnalytics.exe 29 PID 2284 wrote to memory of 2216 2284 cmd.exe 30 PID 2284 wrote to memory of 2216 2284 cmd.exe 30 PID 2284 wrote to memory of 2216 2284 cmd.exe 30 PID 2284 wrote to memory of 2216 2284 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b2a0d9b41e03f2b5069f31c0ba2eeb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0b2a0d9b41e03f2b5069f31c0ba2eeb0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2216
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD51fe2c4c96ed9985bab5cadd1528b2ee5
SHA153bac8dea942c44b04b2ca9ebc13d2ac9759d57f
SHA2561f9188d05ad4f4dfc29d98b63b90356aecb9f791aa80c1c19d098eaf2e8cee8a
SHA51269d7d3f8c3a7155e2fa9eb260a45e86c897d0a0eb324118b8a36acc6f687f3cc2f800820da1bcf6ddb62df312ed4a48dd2979ec67635d6c2db4df2c772acaa12