Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe
-
Size
2.3MB
-
MD5
5f5b1a9f26260883ac92668db65d4a80
-
SHA1
811eac0ee24699805a0c16bb9f17aed62ad1c6e9
-
SHA256
e52a226ef7640361f2398f6bfa818c612f49e5633509d836fef113456d76b6c9
-
SHA512
71716c325218b697f5051fd60d0e64d4d92cb3f22aa07311a684c1bc0a9b2a14fd51e78577d5d944173c1c41c3a4182b142d13e456e8ffb30a2d7025714df4d6
-
SSDEEP
24576:QZSA8nZHZ9ozY6nHHXSuiw+a/ZSkJovBYLYsSwdaJ+4h99Fm+ci2a/ZSrJovBY:RA8nWzY6nHHiw+g+h7Q+F2g
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3316 5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3316 5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4892 3908 WerFault.exe 80 4792 3316 WerFault.exe 89 4072 3316 WerFault.exe 89 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3908 5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3316 5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3908 wrote to memory of 3316 3908 5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe 89 PID 3908 wrote to memory of 3316 3908 5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe 89 PID 3908 wrote to memory of 3316 3908 5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 3442⤵
- Program crash
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\5f5b1a9f26260883ac92668db65d4a80_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 3443⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 3443⤵
- Program crash
PID:4072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3908 -ip 39081⤵PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3316 -ip 33161⤵PID:1448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3316 -ip 33161⤵PID:2032
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD58e3d8c86712e3816ebaeed5411d15077
SHA1b3b16b2c3328fbe12fc5a3c166143d110de3b33f
SHA2561fc4dc525bb035eb61b490cfe7537e0a2e3ed403c0996581cb79d01b71b738bd
SHA512acc18b58e160c11f48142494d2edfd174839785f0cba2d5c7fc465bca6681c40ae4caed932ca286759563cf41069551f1da37abe3e34d9c2b270c59b828fe14f