Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 02:43

General

  • Target

    98a6b7ab6f229656164bd47f83b356a0_NeikiAnalytics.exe

  • Size

    31KB

  • MD5

    98a6b7ab6f229656164bd47f83b356a0

  • SHA1

    9bc0b8419c27b1881984cd21e13dcf7c84fa732e

  • SHA256

    c1538b7e046ae789cfacaf37aabd6e319cda3e05675ad9975e16cb3baa4b0d69

  • SHA512

    88a52dd8e60e294117a0e445228727dbd75a3f78280a81b03211bb5e17ba5fb4ab8b89b685ccc42c07b633460d6387a8f698d949c014e8807f160a3eec06c550

  • SSDEEP

    768:gWFtq/S5ITXT5PZ3Hzpu9fWWq53E0GrIpU:lq656PJpu9fWWq53hGEpU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98a6b7ab6f229656164bd47f83b356a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\98a6b7ab6f229656164bd47f83b356a0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4548
    • C:\Users\Admin\AppData\Local\Temp\flimgt.exe
      "C:\Users\Admin\AppData\Local\Temp\flimgt.exe"
      2⤵
      • Executes dropped EXE
      PID:1400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\flimgt.exe

    Filesize

    31KB

    MD5

    142812b26a176aada63aa36492fbed00

    SHA1

    c7089ef83cb395a2e6d327985a4a92917adb8814

    SHA256

    399f4e50eea8fd9707d29451351061354d18a9646d04cdaaf0a9d9efb66cfc46

    SHA512

    d6ead335c8fa71dcf6832af0b70c8a8660adc8019a1d90c1268a9eee61f8c54b16764ad40471fbb8c32d16c65c076a355f4b7989dc55c16cd6df1458f6a3db2e

  • memory/4548-0-0x0000000004000000-0x0000000004010000-memory.dmp

    Filesize

    64KB