Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 22:14

General

  • Target

    0e5b7f563974e31922f5d067699735e0_NeikiAnalytics.exe

  • Size

    223KB

  • MD5

    0e5b7f563974e31922f5d067699735e0

  • SHA1

    fd6e076f4178b4ddfaf1976262f97a9c58c745d2

  • SHA256

    fc403f41e7707d01d41933760ef870483042fa736d1144880a8c9fda3d6240ed

  • SHA512

    4d7eabe286ecbe49cc090d1263c2219d4b0bd04971140d18dc353ca8f14533a3910d2305a8b4faefe4bd1bea3a0097e2579e0c425f8ce15f530f43d420819002

  • SSDEEP

    3072:Sb22PbVHW0lR4J+f45FowYPO3GBjL8WZesep8TaC+n4ZOB62JHI3GYZjueXVihP:p2PbLuWyrseXCW4uJoLWP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e5b7f563974e31922f5d067699735e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0e5b7f563974e31922f5d067699735e0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\0e5b7f563974e31922f5d067699735e0_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\0e5b7f563974e31922f5d067699735e0_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\0e5b7f563974e31922f5d067699735e0_NeikiAnalytics.exe

    Filesize

    223KB

    MD5

    f4d7abb16179f57ec880c5f4d1772e3b

    SHA1

    6d0b9893e572579c68b1d453e2f11a7313f00ef4

    SHA256

    cff78d40b022df8a6bfdec85fb5b2effbd0281129a6e880414182325647a4495

    SHA512

    aeb5050625dc8f8b28e7567cce49e08dc5c55c0b8a05b6e54710314824caf13524881bab21cf7deef114ca82c0a21b9413c6ce8f3215dcf2c99afc0e9c30f6ed

  • memory/2192-11-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2192-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2192-17-0x0000000000130000-0x0000000000176000-memory.dmp

    Filesize

    280KB

  • memory/2192-18-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2740-0-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2740-6-0x0000000002C70000-0x0000000002CB6000-memory.dmp

    Filesize

    280KB

  • memory/2740-10-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB