Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
521ca9c10ea33567e978148c063348a0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
521ca9c10ea33567e978148c063348a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
521ca9c10ea33567e978148c063348a0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
521ca9c10ea33567e978148c063348a0
-
SHA1
5f1c95967b954ec146d4fb449d24587a3b4f2914
-
SHA256
f49e9075e597d5a220f9ac1f5e0e7f81dc19cc0906a3af2b630205a759b8a770
-
SHA512
6f074a025a56f404bf964f6819b728ddff712ec3f3ed5772386f523f1d5f31358fee89d2476d747484b0f3578c4bf2c9d6b00c6f0af227a6f85b736cbf4eb338
-
SSDEEP
1536:zvhsB3L8IR1f1wOQA8AkqUhMb2nuy5wgIP0CSJ+5yGB8GMGlZ5G:zvKlL8IRJ1lGdqU7uy5w9WMyGN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3528 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1444 2388 521ca9c10ea33567e978148c063348a0_NeikiAnalytics.exe 83 PID 2388 wrote to memory of 1444 2388 521ca9c10ea33567e978148c063348a0_NeikiAnalytics.exe 83 PID 2388 wrote to memory of 1444 2388 521ca9c10ea33567e978148c063348a0_NeikiAnalytics.exe 83 PID 1444 wrote to memory of 3528 1444 cmd.exe 84 PID 1444 wrote to memory of 3528 1444 cmd.exe 84 PID 1444 wrote to memory of 3528 1444 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\521ca9c10ea33567e978148c063348a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\521ca9c10ea33567e978148c063348a0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.exePID:1444
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3528
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5e050ee062abcf9b2f2fbcde0aef75772
SHA1cb753e8fb1d81fd2b6bcc59c5f08efb4995aa25d
SHA256ef7144bf4c1499780fcbac44adc5c8c134748c73af637dd31c688eea2cb5505f
SHA512c5050c7eb70092bad1fce8213cfefe5cbe61db466c609bbe0bdb6336af3b381487bce48bb545faa4dbf0cb47c073bab16b14b14754d1fe57ccbfedfa89db1b5c