Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 05:07 UTC
Static task
static1
Behavioral task
behavioral1
Sample
60b7aa4ea638f374b44cc2676ad447a0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
60b7aa4ea638f374b44cc2676ad447a0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
60b7aa4ea638f374b44cc2676ad447a0_NeikiAnalytics.exe
-
Size
320KB
-
MD5
60b7aa4ea638f374b44cc2676ad447a0
-
SHA1
714f413a11abc1cb26b85dfcfdbb3cb2d20a62a5
-
SHA256
ad90736eea120efefa04cb406bd4ec115cd82fa3df4069754db280d7d7714e87
-
SHA512
498ae8af239e99af1ef83f989cf80ca70f0d0baed02d7722da76b0130f22d3085be728425d3fefc5e227c01a6e6fad53b49801642fb7737190d13308c1258673
-
SSDEEP
6144:xrkohxK0T4RYAbIlmGyaBafHGQDPwUij7sJ660lz9b0i1:xrTg0T4RYHiPwUivMil1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2740 2844 60b7aa4ea638f374b44cc2676ad447a0_NeikiAnalytics.exe 29 PID 2844 wrote to memory of 2740 2844 60b7aa4ea638f374b44cc2676ad447a0_NeikiAnalytics.exe 29 PID 2844 wrote to memory of 2740 2844 60b7aa4ea638f374b44cc2676ad447a0_NeikiAnalytics.exe 29 PID 2740 wrote to memory of 2436 2740 csc.exe 30 PID 2740 wrote to memory of 2436 2740 csc.exe 30 PID 2740 wrote to memory of 2436 2740 csc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\60b7aa4ea638f374b44cc2676ad447a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\60b7aa4ea638f374b44cc2676ad447a0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lmf4xdhj\lmf4xdhj.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES362D.tmp" "c:\Users\Admin\AppData\Local\Temp\lmf4xdhj\CSC7246D83EFB04449293A5591839A692.TMP"3⤵PID:2436
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5166767e26e73aecb2f3433bd3107d1c3
SHA1e9c5e275ba6b6b43c00dbcde8b20d94aa9d7ac5c
SHA256ad6c77a461ec6bf78b23444c7b592a38f29c0e83d0fb8d713e85f5bfca8a6f55
SHA512a549be3a6aca24955d4b71829a4e83efad72d7580db7495b93a3d75419a158d9e4e9943eab18deab31dad5238fd6b24261deaf0fff341bbb7f4dd397beba4222
-
Filesize
4KB
MD56a4a1e65b4f7677261a2ac919c083e3c
SHA1cf6fa0cbb250b3dbecc51b3949daa7cda408985a
SHA2568e1a15fde0a411775eee6f8245fb08097cd4a2aa88a44534b39d0840c544af50
SHA51207d1d82b16fbaf436a296190b5d1b4ced9e3473d9736e2011dcd7fdd3a11d725a550f0390fb156c5b23708140971b924c8af42f2aa69517111bdaeda8ba9b80d
-
Filesize
652B
MD5a4a09bcd01de34331b1ba7d079e3bfc9
SHA1a9cc4b4dec111d5c0b9471ee25bb8b7adc825b0d
SHA256fdddfa95f89a2b6cc75e84d0842849a46a9782ab8e56ab7992b6b5f2d28151a2
SHA512defb2556b0cdeff9915581f1ae0cedd719b0b70c79fbc81b2b0dba76c6d4a7825bee5cf2586775825bc99ea05e8d2ac9e649c909696e6f1fbcbc3205369269f4
-
Filesize
1KB
MD5f420ebb3150f0764331a33377a7451b8
SHA18ed9b9d610e8ab76aea82a3830ad31059517630b
SHA256dfb6ab38744b3a4e17cf7fa75b3126e88cbeabc907008f3921ff41c523a99a27
SHA512b92767736261cb7c10f58576c44e62cd0d105e90e139b376d52ccb5cb7ca189205a1f7d7a5fec5d739f8763eded8b5c55b9057217fe9a55b1e151dc700760cbd
-
Filesize
208B
MD549e55b24a9ec01b6184ee586134b59e7
SHA1b216465f491ec25694bb988094397fdfe065ec7a
SHA2562ef8381d29dc5570b834711d6c426b90e92b3390f94b77a700b8d7bc1727c0db
SHA512813c3a49722e9b4522617fff7268825fdb5605a0396e0927eeafad4909b26b5a0b79e8bca322fb2ea2245329fca1ef14dd04412bf7c6473c2054180e1a5033e5