Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe
-
Size
105KB
-
MD5
3e56dff208c8a89d0422deb373c259a0
-
SHA1
5b6e3741896d3a1ba653c71a7992cc086c5038e9
-
SHA256
97424618e15efedae348948cc1fbabbe41fea810db7ab9c30170d1503014df9a
-
SHA512
03a6e7401e670dded0b32bd16a422955a80a1a03d6ffaa87451b2ead0aba538ec5d705e5dffa32fe02849daf522b78402cf5b0dcabbfe4aff624dabaf640b393
-
SSDEEP
3072:HAoAliulHnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nbnl1RRhCV:gSAw65
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2196 2200 3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe 28 PID 2200 wrote to memory of 2196 2200 3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe 28 PID 2200 wrote to memory of 2196 2200 3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe 28 PID 2200 wrote to memory of 2196 2200 3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3e56dff208c8a89d0422deb373c259a0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD596aa6bf7cf16da84584b19e45ada7dc7
SHA1a5082bef380be77b5e6dbebf800b68c4c2264b9a
SHA256773aa3506963a715fc35ceb5d95fbb029708bda2ec44475503eb54bffe3772e2
SHA5122e8cf0dc3e2c2b9f500dc23c8f1f15eae3f29e99f6e47a70cc878d7b0e4b2abd020624f433d69bc67bfa03fa032e26f5585ee69716c1df0405133c97a8f5cb22