Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
2262610bdecc084b5f6eaa4ca1557d10
-
SHA1
8ff26aa40ca201756b0dd78eb96f778f56a5dfeb
-
SHA256
06640dbc5415d74b5f078d05eee15a5cb4e69994389106860583a9270aaa783a
-
SHA512
15ad49a9995de80cad5a9261d92b40533d3c955889faa4fea57ca95c50ea6ac9692ed00c375224636ce419dc1121b38836240e2591a4b6b3131323913f95b9c9
-
SSDEEP
24576:FCd9roElLpROYKfNO1B8c/HfKaZiCg74za/ZSE0E77sFZTDleyVVv:EEKLn28qcHKaXg7Mgl0EghcyVVv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2948 2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Program crash 8 IoCs
pid pid_target Process procid_target 2816 2976 WerFault.exe 80 4700 2948 WerFault.exe 85 1664 2948 WerFault.exe 85 2080 2948 WerFault.exe 85 3676 2948 WerFault.exe 85 4924 2948 WerFault.exe 85 756 2948 WerFault.exe 85 3960 2948 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2948 2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe 2948 2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2976 2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2948 2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2948 2976 2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe 85 PID 2976 wrote to memory of 2948 2976 2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe 85 PID 2976 wrote to memory of 2948 2976 2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 3442⤵
- Program crash
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\2262610bdecc084b5f6eaa4ca1557d10_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 3483⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 6363⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 6763⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 6403⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 7203⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 9923⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 6323⤵
- Program crash
PID:3960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2976 -ip 29761⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2948 -ip 29481⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2948 -ip 29481⤵PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2948 -ip 29481⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2948 -ip 29481⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2948 -ip 29481⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2948 -ip 29481⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2948 -ip 29481⤵PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ac28a8aaac950163ae925430a8654e5d
SHA13f3bcad149f0923a479d388fbe30a0b6f3593e3d
SHA256fe45b1a83ff7efbbac3c803d1c4b157f34a7159a12d8ddd2be06c6bacb0ba906
SHA512b866703f447bc240607b00d5f9b475266e85bc7eb6578468cc53298878c79afa67edf4ac26bf47625d9ee3a35e319a7168996722d113b92d71a508af6decf718