Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
20f862bace6b0d2fcd0ce9829c216e80_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20f862bace6b0d2fcd0ce9829c216e80_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
20f862bace6b0d2fcd0ce9829c216e80_NeikiAnalytics.exe
-
Size
49KB
-
MD5
20f862bace6b0d2fcd0ce9829c216e80
-
SHA1
2b7915e89f88e75ad6f9fa52f1d1822c46959d0a
-
SHA256
19f51344fd8b44be509ebac498fac81e594e435f1810d2029c98083ac094061f
-
SHA512
db7ad66eca68cfece6375842b33c9df1ab9ee542c74ee49a7c48a83141f421adcf3fc1fa8dde9a294caa393b236f133f8b27cfc00fe610742af0f71d5761c65d
-
SSDEEP
768:Y4VqN6B1syPDb5d3mOWDsKxlpv84txV9N/SlIj+bCjz4t22Vh+u3L8:06oypd3mOWDsKxlN84R9BjKmzu3VhXb8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 20f862bace6b0d2fcd0ce9829c216e80_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4612 mailupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2532 wrote to memory of 4612 2532 20f862bace6b0d2fcd0ce9829c216e80_NeikiAnalytics.exe 82 PID 2532 wrote to memory of 4612 2532 20f862bace6b0d2fcd0ce9829c216e80_NeikiAnalytics.exe 82 PID 2532 wrote to memory of 4612 2532 20f862bace6b0d2fcd0ce9829c216e80_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\20f862bace6b0d2fcd0ce9829c216e80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\20f862bace6b0d2fcd0ce9829c216e80_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\mailupdate.exe"C:\Users\Admin\AppData\Local\Temp\mailupdate.exe"2⤵
- Executes dropped EXE
PID:4612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5e7870c1112642b7c0935576ec8948eb5
SHA15ab9fe5ac72b962cf0af7a52daaef98dccd19b8b
SHA256f9c68bf304e71e785d8ed0b7e97a3d83cb646074798e07b773c3e824b599cc0f
SHA51273e5a9f6bfa0d48fd7c3b0155628309d1747dede0257b74e2294f2eb21b982cfe330386e5d7d3d3248e35fad6c0d1fc55db97fb6b63bb16669cd03649afc0893