Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 02:29
Behavioral task
behavioral1
Sample
984670621eabffc9154cb6e9e410cd70_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
984670621eabffc9154cb6e9e410cd70_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
984670621eabffc9154cb6e9e410cd70_NeikiAnalytics.exe
-
Size
78KB
-
MD5
984670621eabffc9154cb6e9e410cd70
-
SHA1
385f71f4bbc2077a6df26578410936cfeb48c008
-
SHA256
bd3870459b9758c7c10d802aa3184e9180bcf506f574b886d1d2de0f4149b5ea
-
SHA512
dc295bdd8342d8ec33663413e76ec3c66232822f5de25c4d7fc5c9a44bb01b101601a06c0761a4c0e3ae208c495d053114233d5ac1470f5c6e634936fd6a33cd
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxO:T6a+rdOOtEvwDpjNtHP9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 984670621eabffc9154cb6e9e410cd70_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1152 asih.exe -
resource yara_rule behavioral2/memory/4460-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0006000000023288-13.dat upx behavioral2/memory/4460-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1152-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1152-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1152 4460 984670621eabffc9154cb6e9e410cd70_NeikiAnalytics.exe 81 PID 4460 wrote to memory of 1152 4460 984670621eabffc9154cb6e9e410cd70_NeikiAnalytics.exe 81 PID 4460 wrote to memory of 1152 4460 984670621eabffc9154cb6e9e410cd70_NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\984670621eabffc9154cb6e9e410cd70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\984670621eabffc9154cb6e9e410cd70_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD527fc1f478bedbd91b54da3bc30da1410
SHA17334ab3b5464568e79345b51c145df46850145a0
SHA256dcaee0d9a66992dce43941b0f001f9781c62625cd2bceefc5e67fd3f39f7b460
SHA5127e1018ef3e9aea78b0039155d2dee83af7fd802baad4736c1cfff0093a29f4fccf85ad24f964c672de0e3d1a61cd142862a2b5ae8fa504b7a905dc9ea308252a