Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    23s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 06:23

General

  • Target

    3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe

  • Size

    615KB

  • MD5

    3784d2644d0bd43ba58a1f0338bec260

  • SHA1

    325d7de0c5342ae68d5903c4656eb2d96e884d01

  • SHA256

    379ff58115070444a238c585d173af33d2b615dbba46f03ff5745e13bf6bd2d0

  • SHA512

    ab53357273ac36cddd95e416538fbd81c7e506bed0d1f7acb81cc176019652501a9e357f037067ff42d741514c8ab3d1284cbdcbfbb60a4995f6ae24ebe6f5bc

  • SSDEEP

    12288:wlbX+Waplw9U+qMi8CtdVldusIh6BBHCHrKZXCktSzIzWpX5a:WbX+NYTqMi8CtBd2QHCHmTBW5a

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1184
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devF4C.tmp!C:\Users\Admin\AppData\Local\Temp\3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Users\Admin\AppData\Local\Temp\3784D2644D0BD43BA58A1F0338BEC260_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2700
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devF4C.tmp!C:\Users\Admin\AppData\Local\Temp\3784D2644D0BD43BA58A1F0338BEC260_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3784D2644D0BD43BA58A1F0338BEC260_NEIKIANALYTICS.EXE

    Filesize

    615KB

    MD5

    23be70a89b2aea54e60027d594e81043

    SHA1

    7c6fa63e71a6481bfecf908d4e782d1a0221571f

    SHA256

    ad6feac659aa18827d8642c142f05cc2f3f9a5f8a7446fe13a1e9dc38415c67d

    SHA512

    14909da39a09277b0306c3f65a44b9655a35bb768da3a862f4eed7e9cdc68840ef40bbcac5c5e39444efe6771a6bc6c74ba39679aeb1d396ab583e5d8bccba3e

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    336ffd74e5eb29bc13e4e0f5de0cb57a

    SHA1

    fb3bab77482267f8880cd329d926a41d397d072d

    SHA256

    688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79

    SHA512

    e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76

  • \Users\Admin\AppData\Local\Temp\3784d2644d0bd43ba58a1f0338bec260_NeikiAnalytics.exe

    Filesize

    568KB

    MD5

    04fb3ae7f05c8bc333125972ba907398

    SHA1

    df22612647e9404a515d48ebad490349685250de

    SHA256

    2fb898bacb587f2484c9c4aa6da2729079d93d1f923a017bb84beef87bf74fef

    SHA512

    94c164a0b884c939ece30f5038d07b756702998d46786f9f613fbea2eb30bed4bc19a409f347bb4cc565898473b18155d580b453683223beaf30ed4079c251b2

  • memory/1184-35-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1272-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1272-34-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2008-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2008-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2568-31-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB