Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 17:51

General

  • Target

    06509d183ce1515c24b41d849af40f40_NeikiAnalytics.exe

  • Size

    60KB

  • MD5

    06509d183ce1515c24b41d849af40f40

  • SHA1

    2573680fc35f3d4524040b8524942067cfe08417

  • SHA256

    bf696b12e98f9a1a0276f66220216cf2c582463d9e2353f35c6f763fa5e2df9f

  • SHA512

    e2206e7c4be66e900f7c45f22257ef16470aca6f77bb792b448a56a74f57a6e4aa4756b0eac6c8a29a26bd8ee94b4377e99bef6dc73c548a5d8a6245213bf5a6

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHXM:btng54SMLr+/AO/kIhfoKMHdF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06509d183ce1515c24b41d849af40f40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\06509d183ce1515c24b41d849af40f40_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    60KB

    MD5

    a7986c635d144b890eb077e91cec8eb7

    SHA1

    44c86db46eceb5090f391c1179d83a0aa4ad4b43

    SHA256

    109e327849619530059a622bb7ca3931a79698ac9285e13f0d19c1fc21fcce51

    SHA512

    bad0d03902be9fe2d0580f8095d317628f24c1afb74576f2aacaa9dbe5979e33526445ef5cc5399aa09699ee64708bfb6f5a8ff279e42e87de3d2f19bbb5c33a

  • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

    Filesize

    185B

    MD5

    50de689f08190770f09d1020c2206d00

    SHA1

    457c8c2dfbacd9909a83ae790a819d96ec2f8523

    SHA256

    faf026cf149c91edf65203814ece08e7c013e6682d1e9f8c7870894cadb597fd

    SHA512

    30a79f0dd3ee618dbb227f741d622855fdfa1e52c16ae71327d8f0628dba3f0a15774367782334c8d6b0ee38f9c7faad456add1d7cb5344fdecd1dc272e41d06

  • memory/3064-25-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/3428-0-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/3428-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3428-8-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB