Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
1191b1e1212dc9a00cfb1348f2fc5f60_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1191b1e1212dc9a00cfb1348f2fc5f60_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
1191b1e1212dc9a00cfb1348f2fc5f60_NeikiAnalytics.dll
-
Size
414KB
-
MD5
1191b1e1212dc9a00cfb1348f2fc5f60
-
SHA1
7c41f137fd1e04d9b1bd5964c5a0a4b46211444a
-
SHA256
1f467d53902f7fed3bf34e73c3fff0465a40df5b6c228910193084d50227b737
-
SHA512
3f2857345b59329d51a2cafccd82d97c4dab4ae0b2efad4020a5d567aef361b04624a37dcabbc4f2749055bbc0ac2d120472012b8c4b491cbef89eb8e05e42aa
-
SSDEEP
6144:11sA6fnlk/peWuqQYkeLAD3f1sUnzzK6Fou6i8TKj3tF:vinQ85nYpLmJK6Fh78oP
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1972 rundll32.exe 1972 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2908 1744 rundll32.exe 28 PID 1744 wrote to memory of 2908 1744 rundll32.exe 28 PID 1744 wrote to memory of 2908 1744 rundll32.exe 28 PID 1744 wrote to memory of 2908 1744 rundll32.exe 28 PID 1744 wrote to memory of 2908 1744 rundll32.exe 28 PID 1744 wrote to memory of 2908 1744 rundll32.exe 28 PID 1744 wrote to memory of 2908 1744 rundll32.exe 28 PID 2908 wrote to memory of 1972 2908 rundll32.exe 29 PID 2908 wrote to memory of 1972 2908 rundll32.exe 29 PID 2908 wrote to memory of 1972 2908 rundll32.exe 29 PID 2908 wrote to memory of 1972 2908 rundll32.exe 29 PID 2908 wrote to memory of 1972 2908 rundll32.exe 29 PID 2908 wrote to memory of 1972 2908 rundll32.exe 29 PID 2908 wrote to memory of 1972 2908 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1191b1e1212dc9a00cfb1348f2fc5f60_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1191b1e1212dc9a00cfb1348f2fc5f60_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\1191b1e1212dc9a00cfb1348f2fc5f60_NeikiAnalytics.dll",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259398665 2623883⤵
- Loads dropped DLL
PID:1972
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\1191b1e1212dc9a00cfb1348f2fc5f60_NeikiAnalytics.dll-\Microsoft.Deployment.WindowsInstaller.dll
Filesize172KB
MD54e04a4cb2cf220aecc23ea1884c74693
SHA1a828c986d737f89ee1d9b50e63c540d48096957f
SHA256cfed1841c76c9731035ebb61d5dc5656babf1beff6ed395e1c6b85bb9c74f85a
SHA512c0b850fbc24efad8207a3fcca11217cb52f1d08b14deb16b8e813903fecd90714eb1a4b91b329cf779afff3d90963380f7cfd1555ffc27bd4ac6598c709443c4