Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
3aa04d5f47ebdf552d7e1486b3368f70_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3aa04d5f47ebdf552d7e1486b3368f70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3aa04d5f47ebdf552d7e1486b3368f70_NeikiAnalytics.exe
-
Size
79KB
-
MD5
3aa04d5f47ebdf552d7e1486b3368f70
-
SHA1
5114106ab01d4a3b3c6117003e917b9dd6c04ef8
-
SHA256
e1c5ea17c15fdba2eb6cddd79fda9f816d15bae5102b4ef7fb232be444bf4e90
-
SHA512
b59144cc6e5b54ee3b55342753a0cf397611761eace71fe744945422edee8e564f610b48c7d12f1e6d575d340275e0b0dab6bd83d1eaaef5aecb8b6d6331a402
-
SSDEEP
1536:zvUdgeKieKRKpOQA8AkqUhMb2nuy5wgIP0CSJ+5yjhB8GMGlZ5G:zvUueKKRKoGdqU7uy5w9WMytN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4040 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3464 5112 3aa04d5f47ebdf552d7e1486b3368f70_NeikiAnalytics.exe 84 PID 5112 wrote to memory of 3464 5112 3aa04d5f47ebdf552d7e1486b3368f70_NeikiAnalytics.exe 84 PID 5112 wrote to memory of 3464 5112 3aa04d5f47ebdf552d7e1486b3368f70_NeikiAnalytics.exe 84 PID 3464 wrote to memory of 4040 3464 cmd.exe 85 PID 3464 wrote to memory of 4040 3464 cmd.exe 85 PID 3464 wrote to memory of 4040 3464 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aa04d5f47ebdf552d7e1486b3368f70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3aa04d5f47ebdf552d7e1486b3368f70_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\cmd.exePID:3464
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4040
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5acff52b00f44e89dcf7c41b996b15f79
SHA16a3856ac561c9e74a28263bf096b55461edcfd88
SHA256967f3b2e9e59096fdc7cc8c8fdcb38699a52747b0bb9514a5b11cda6f5fb0932
SHA5128ea7a6e7bf538f3d76dbe22e6cdfd462fd88e6e653fdaa56eec6745690d9c6e9063310febe3a83b55e9711f9a51aa7684131c6a979cc95d7c21223a1c6deaa6d