Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
568165ddfd0467ba2951bd78a203b600_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
568165ddfd0467ba2951bd78a203b600_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
568165ddfd0467ba2951bd78a203b600_NeikiAnalytics.exe
-
Size
79KB
-
MD5
568165ddfd0467ba2951bd78a203b600
-
SHA1
cc85a38edc3cd487c2488dc64012aa38a7f1e8d4
-
SHA256
6d98fb3bddbdae100cc6b4e4e465f6f6bd4d9b03a8d154ffecfffae7dd355fc2
-
SHA512
6de5f905c388a84728f4c5d7c51281078b0874c33521ed6156355ee81169610945a7b0f15eae9e1af80aa7134f84e8106025a48dfc34ffc74bbdea5c2eef2f57
-
SSDEEP
1536:zvO/iWQN7sVqtRZuuOQA8AkqUhMb2nuy5wgIP0CSJ+5yzB8GMGlZ5G:zvO6LP7Z+GdqU7uy5w9WMyzN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3932 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3628 wrote to memory of 1996 3628 568165ddfd0467ba2951bd78a203b600_NeikiAnalytics.exe 85 PID 3628 wrote to memory of 1996 3628 568165ddfd0467ba2951bd78a203b600_NeikiAnalytics.exe 85 PID 3628 wrote to memory of 1996 3628 568165ddfd0467ba2951bd78a203b600_NeikiAnalytics.exe 85 PID 1996 wrote to memory of 3932 1996 cmd.exe 86 PID 1996 wrote to memory of 3932 1996 cmd.exe 86 PID 1996 wrote to memory of 3932 1996 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\568165ddfd0467ba2951bd78a203b600_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\568165ddfd0467ba2951bd78a203b600_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exePID:1996
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3932
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5a6353fb847b55dd5afe9da9cc9368e8d
SHA152a458131b8b89231f5749585d0dd4bb82d82fa5
SHA256a3d9e66ad70d7f138711f8662299298795003f5772f09be80c451185ec2f6d16
SHA512daa5ab672a69b391d4151409e68a7abea2861f5b8c9b15030ac2d20fcc1d5a98f1d8ff4aaf6a9e30dfac8f4cf8d9103fe6670abf4c3c39abc82bcbfd13506743