Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe
-
Size
154KB
-
MD5
3b14377809fc58fbe554a135056eaea0
-
SHA1
426f64f9042f5cfc197fb33549c3f3afa815aeb4
-
SHA256
56f371962808aaa4c7e6f5395fdc46c1c2cf285167ffc832108899eda496cbee
-
SHA512
08a1eb2455eacfe04badf8bbd5377a247884c74e179d481b129d12c91e8522efe403e05b4d671bf158aaab548d7e8074957e8d9b805006d6021d3fed9031944d
-
SSDEEP
1536:oETaQrX6GfPfVPfr5NhdhbDYhmp0pk8o+EtzGQ8m3oFGnKuV3z70VbLIudp:oaF3N7zhdVDazpk8o+WGQ8gHxDabLIu7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2268 29dk54n4c.exe 3000 29dk54n4c.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 2268 29dk54n4c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\bxvxkei6 = "C:\\Users\\Admin\\AppData\\Roaming\\29dk54n4c.exe" 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3048 set thread context of 2040 3048 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 28 PID 2268 set thread context of 3000 2268 29dk54n4c.exe 30 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2040 3048 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 28 PID 3048 wrote to memory of 2040 3048 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 28 PID 3048 wrote to memory of 2040 3048 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 28 PID 3048 wrote to memory of 2040 3048 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 28 PID 3048 wrote to memory of 2040 3048 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 28 PID 3048 wrote to memory of 2040 3048 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 2268 2040 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 29 PID 2040 wrote to memory of 2268 2040 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 29 PID 2040 wrote to memory of 2268 2040 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 29 PID 2040 wrote to memory of 2268 2040 3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe 29 PID 2268 wrote to memory of 3000 2268 29dk54n4c.exe 30 PID 2268 wrote to memory of 3000 2268 29dk54n4c.exe 30 PID 2268 wrote to memory of 3000 2268 29dk54n4c.exe 30 PID 2268 wrote to memory of 3000 2268 29dk54n4c.exe 30 PID 2268 wrote to memory of 3000 2268 29dk54n4c.exe 30 PID 2268 wrote to memory of 3000 2268 29dk54n4c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\29dk54n4c.exeC:\Users\Admin\AppData\Roaming\29dk54n4c.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Roaming\29dk54n4c.exeC:\Users\Admin\AppData\Roaming\29dk54n4c.exe4⤵
- Executes dropped EXE
PID:3000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD54e86ca51fa4e4e02dd4516bebb3bc190
SHA1486570e6a1aa6b85023f44c7a53b804e10811ade
SHA2565be4bcce0274ecc811d92efc111a35a5307ad4142759f55fae3d709890f94b53
SHA512242c6a733e52622cbf766486226334032c997e01f2d3621db8561063b2ac0ac84b0152498d1e52506b7270e7aaf23521564181c8e9b484f7983cfaa2576c5a7f