Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 01:20
Behavioral task
behavioral1
Sample
9683f68029eddea9c988e91fed8f6f00_NeikiAnalytics.dll
Resource
win7-20240611-en
4 signatures
150 seconds
General
-
Target
9683f68029eddea9c988e91fed8f6f00_NeikiAnalytics.dll
-
Size
899KB
-
MD5
9683f68029eddea9c988e91fed8f6f00
-
SHA1
136dfa726ded1cf6d51794c85cb9def0d7dd5aea
-
SHA256
f654555751eafe297ce76580a1a1f5976b8abb982602eb8e2f06aa34e5295d78
-
SHA512
f7872357d894a724e8844c5279ceabe325cf9892ad788bc1560709ec9932f897fd5b5d06b0d874ebdee21db5ab3fc9f501efdb425fe3f7922bc44a1f955632f0
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXa:7wqd87Va
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/620-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 620 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1252 wrote to memory of 620 1252 rundll32.exe 81 PID 1252 wrote to memory of 620 1252 rundll32.exe 81 PID 1252 wrote to memory of 620 1252 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9683f68029eddea9c988e91fed8f6f00_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9683f68029eddea9c988e91fed8f6f00_NeikiAnalytics.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:620
-