Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2024, 07:14

General

  • Target

    9230a7115cc5c55ebfa095e62fd7a290_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    9230a7115cc5c55ebfa095e62fd7a290

  • SHA1

    e2287bc6f342e51c70c09e0c8bc0e01e30e2c55d

  • SHA256

    4f553429bdd34e794295e110e6cb6da3741e75d6d4022831812f3a5797527c09

  • SHA512

    a425972545e0328258e1e8e4e257559520946de1caaa8c24fc63b826f354d7625f2dd3ec594f50a271b2da651d80576a9cad51adcc390896ab91c937477458cf

  • SSDEEP

    1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qc:riAyLN9aa+9U2rW1ip6pr2At7NZuQc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9230a7115cc5c55ebfa095e62fd7a290_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\9230a7115cc5c55ebfa095e62fd7a290_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Update\WwanSvc.exe

    Filesize

    134KB

    MD5

    86bfeaea3ed30a806a470f7cc6ababd3

    SHA1

    79788cd90b79097af59a6832433e0f225fdef681

    SHA256

    e1dfcd7d63cd4f62cee66ed3d9a9ebf561a4ea37b8379e3606ec4f07849f0995

    SHA512

    e0cdda7cae5cdd1b9cd69380f33f2f68c1522ac723e835cda3429f3efc7abec3be22f9b1686b77620a58be35d5462c1c6464211bb87c8337cbc11ae31183647c

  • memory/952-6-0x0000000000870000-0x0000000000898000-memory.dmp

    Filesize

    160KB

  • memory/2624-0-0x00000000009B0000-0x00000000009D8000-memory.dmp

    Filesize

    160KB

  • memory/2624-4-0x00000000009B0000-0x00000000009D8000-memory.dmp

    Filesize

    160KB