Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 01:18

General

  • Target

    2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe

  • Size

    1.3MB

  • MD5

    2262610bdecc084b5f6eaa4ca1557d10

  • SHA1

    8ff26aa40ca201756b0dd78eb96f778f56a5dfeb

  • SHA256

    06640dbc5415d74b5f078d05eee15a5cb4e69994389106860583a9270aaa783a

  • SHA512

    15ad49a9995de80cad5a9261d92b40533d3c955889faa4fea57ca95c50ea6ac9692ed00c375224636ce419dc1121b38836240e2591a4b6b3131323913f95b9c9

  • SSDEEP

    24576:FCd9roElLpROYKfNO1B8c/HfKaZiCg74za/ZSE0E77sFZTDleyVVv:EEKLn28qcHKaXg7Mgl0EghcyVVv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Program crash 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 344
      2⤵
      • Program crash
      PID:2816
    • C:\Users\Admin\AppData\Local\Temp\2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:2948
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 348
        3⤵
        • Program crash
        PID:4700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 636
        3⤵
        • Program crash
        PID:1664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 676
        3⤵
        • Program crash
        PID:2080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 640
        3⤵
        • Program crash
        PID:3676
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 720
        3⤵
        • Program crash
        PID:4924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 992
        3⤵
        • Program crash
        PID:756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 632
        3⤵
        • Program crash
        PID:3960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2976 -ip 2976
    1⤵
      PID:1220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2948 -ip 2948
      1⤵
        PID:2708
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2948 -ip 2948
        1⤵
          PID:556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2948 -ip 2948
          1⤵
            PID:2244
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2948 -ip 2948
            1⤵
              PID:4324
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2948 -ip 2948
              1⤵
                PID:1096
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2948 -ip 2948
                1⤵
                  PID:1736
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2948 -ip 2948
                  1⤵
                    PID:2644

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe

                    Filesize

                    1.3MB

                    MD5

                    ac28a8aaac950163ae925430a8654e5d

                    SHA1

                    3f3bcad149f0923a479d388fbe30a0b6f3593e3d

                    SHA256

                    fe45b1a83ff7efbbac3c803d1c4b157f34a7159a12d8ddd2be06c6bacb0ba906

                    SHA512

                    b866703f447bc240607b00d5f9b475266e85bc7eb6578468cc53298878c79afa67edf4ac26bf47625d9ee3a35e319a7168996722d113b92d71a508af6decf718

                  • memory/2948-7-0x0000000000400000-0x00000000004EF000-memory.dmp

                    Filesize

                    956KB

                  • memory/2948-8-0x0000000000400000-0x00000000004A3000-memory.dmp

                    Filesize

                    652KB

                  • memory/2948-14-0x0000000004E30000-0x0000000004F1F000-memory.dmp

                    Filesize

                    956KB

                  • memory/2948-16-0x0000000000400000-0x0000000000443000-memory.dmp

                    Filesize

                    268KB

                  • memory/2948-21-0x000000000A850000-0x000000000A8F3000-memory.dmp

                    Filesize

                    652KB

                  • memory/2976-0-0x0000000000400000-0x00000000004EF000-memory.dmp

                    Filesize

                    956KB

                  • memory/2976-6-0x0000000000400000-0x00000000004EF000-memory.dmp

                    Filesize

                    956KB