Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
57bdc439c8934bcbb81ae518cd7f74f0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
57bdc439c8934bcbb81ae518cd7f74f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
57bdc439c8934bcbb81ae518cd7f74f0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
57bdc439c8934bcbb81ae518cd7f74f0
-
SHA1
66c1051aa242e3b3a4a7bebf05054a3c16be9d7f
-
SHA256
28681224ed31b15f0853a7fd4e9e31e5bbf835042e0e6825a4ad6fdb3cd10c5c
-
SHA512
b207ef7ba2aaeb9b6be582f640252028b613b9a24fd591da6b030aca493cbd14158016debd71703b4e3900cc86fb312bf4bacb6d4ebafac63e246fc8167d6cd2
-
SSDEEP
1536:zv3yCHpuHMR5KOQA8AkqUhMb2nuy5wgIP0CSJ+5yTB8GMGlZ5G:zvi0uHM3/GdqU7uy5w9WMyTN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2572 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 1972 cmd.exe 1972 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1972 2184 57bdc439c8934bcbb81ae518cd7f74f0_NeikiAnalytics.exe 30 PID 2184 wrote to memory of 1972 2184 57bdc439c8934bcbb81ae518cd7f74f0_NeikiAnalytics.exe 30 PID 2184 wrote to memory of 1972 2184 57bdc439c8934bcbb81ae518cd7f74f0_NeikiAnalytics.exe 30 PID 2184 wrote to memory of 1972 2184 57bdc439c8934bcbb81ae518cd7f74f0_NeikiAnalytics.exe 30 PID 1972 wrote to memory of 2572 1972 cmd.exe 31 PID 1972 wrote to memory of 2572 1972 cmd.exe 31 PID 1972 wrote to memory of 2572 1972 cmd.exe 31 PID 1972 wrote to memory of 2572 1972 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\57bdc439c8934bcbb81ae518cd7f74f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\57bdc439c8934bcbb81ae518cd7f74f0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2572
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD59f98ad41a04fc7d1df88e522a13abc94
SHA119e51629f79bc66bd999491d4570f6891ade7056
SHA25644e0de7bf8dacea17d206625dde876d8c25c83035c9f4d0cd8f29027234addb4
SHA512e24cc859649f43e120c8fbb5f6cfafc83a96f97e25fb78a267ed6a8afe3c05bde634d5088d155b58099e0c1229ca443f4676673098d7b8a0e9de3aa4d6fcc7ac