Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2024, 04:40

General

  • Target

    3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe

  • Size

    154KB

  • MD5

    3b14377809fc58fbe554a135056eaea0

  • SHA1

    426f64f9042f5cfc197fb33549c3f3afa815aeb4

  • SHA256

    56f371962808aaa4c7e6f5395fdc46c1c2cf285167ffc832108899eda496cbee

  • SHA512

    08a1eb2455eacfe04badf8bbd5377a247884c74e179d481b129d12c91e8522efe403e05b4d671bf158aaab548d7e8074957e8d9b805006d6021d3fed9031944d

  • SSDEEP

    1536:oETaQrX6GfPfVPfr5NhdhbDYhmp0pk8o+EtzGQ8m3oFGnKuV3z70VbLIudp:oaF3N7zhdVDazpk8o+WGQ8gHxDabLIu7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\AppData\Local\Temp\3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\3b14377809fc58fbe554a135056eaea0_NeikiAnalytics.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Users\Admin\AppData\Roaming\df8x9.exe
        C:\Users\Admin\AppData\Roaming\df8x9.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Users\Admin\AppData\Roaming\df8x9.exe
          C:\Users\Admin\AppData\Roaming\df8x9.exe
          4⤵
          • Executes dropped EXE
          PID:2724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 404
          4⤵
          • Program crash
          PID:1872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 392
      2⤵
      • Program crash
      PID:3916
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2912 -ip 2912
    1⤵
      PID:3084
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3008 -ip 3008
      1⤵
        PID:452

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\df8x9.exe

        Filesize

        154KB

        MD5

        5abf1da2165402272ffaf304b2eb193e

        SHA1

        bf99e58abdf414e2ee6c08e115340ed1256c45fa

        SHA256

        2039938a6446ec912698b7ae3119650ce58eea9ddbae516492e75ba87d056d38

        SHA512

        8ee7e422571bd6a710426ec2b5267a26d29c9e68459ef3073dc375d6ff0e15be429cd8f127e45a0b951d4ab5d7ca391e222833e838eb3fbe25b3fe568804aaa8

      • memory/1812-0-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/1812-1-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/1812-2-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/1812-5-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2724-11-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2724-10-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2724-12-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2724-14-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2724-16-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2724-18-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB