Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
7d8dc19570ce324c6910f1f6e72c3b00_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d8dc19570ce324c6910f1f6e72c3b00_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7d8dc19570ce324c6910f1f6e72c3b00_NeikiAnalytics.exe
-
Size
73KB
-
MD5
7d8dc19570ce324c6910f1f6e72c3b00
-
SHA1
f1c8a7b3bcf085f828a92790a2f178923544fe11
-
SHA256
5ccd6fb184783fc2c8e90c8f8577a08a6486376b47e5baba8863b52a2d722950
-
SHA512
acc40a461e3aca163b8530b8e0859c6d645e43b19933cb87ad05fe002cf682e513be3a029554addb91936167c112d8e53470ce4b1609d39ab692f1cb89972682
-
SSDEEP
1536:hb7+3mgJpvUGK5QPqfhVWbdsmA+RjPFLC+e5hh0ZGUGf2g:hX+2gJpvUGNPqfcxA+HFshhOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3004 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2584 cmd.exe 2584 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2584 2484 7d8dc19570ce324c6910f1f6e72c3b00_NeikiAnalytics.exe 29 PID 2484 wrote to memory of 2584 2484 7d8dc19570ce324c6910f1f6e72c3b00_NeikiAnalytics.exe 29 PID 2484 wrote to memory of 2584 2484 7d8dc19570ce324c6910f1f6e72c3b00_NeikiAnalytics.exe 29 PID 2484 wrote to memory of 2584 2484 7d8dc19570ce324c6910f1f6e72c3b00_NeikiAnalytics.exe 29 PID 2584 wrote to memory of 3004 2584 cmd.exe 30 PID 2584 wrote to memory of 3004 2584 cmd.exe 30 PID 2584 wrote to memory of 3004 2584 cmd.exe 30 PID 2584 wrote to memory of 3004 2584 cmd.exe 30 PID 3004 wrote to memory of 1964 3004 [email protected] 31 PID 3004 wrote to memory of 1964 3004 [email protected] 31 PID 3004 wrote to memory of 1964 3004 [email protected] 31 PID 3004 wrote to memory of 1964 3004 [email protected] 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d8dc19570ce324c6910f1f6e72c3b00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7d8dc19570ce324c6910f1f6e72c3b00_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 16256.exe4⤵PID:1964
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5b8cce1d4c2a9717e88aec7dec6e70bac
SHA1b81a5216c3128ff0688060046e7f1d3e0b4b80fa
SHA25652f965f48fb4001061f42a6275f49571e069024efe84e8fa1611b105e1e74970
SHA51267120ebaa7fbdda007c73d8c212393ee290d3c0f5d6d0e3a430ea97a091625423d8d5ade6080bc6d4c4877af6498e578c6aa7b0ac25bcb9568c5df831c7db11a