Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/06/2024, 05:42

General

  • Target

    530450a00e01282f2d44c47d602f0b80_NeikiAnalytics.exe

  • Size

    410KB

  • MD5

    530450a00e01282f2d44c47d602f0b80

  • SHA1

    16b9c6ca0790774277067a6dfa5a64130dfe5bf6

  • SHA256

    ccaadc0d08e0c5fe69c30ff06b8a8254da1025f6c91fabd0985b13a60a1c88bc

  • SHA512

    217436e0e518805f15e96fc0c53d2c9e8b9b83373440140ff8414052839d8b34ebc67e203e4ac5733c2f74c06701244980086a689be5d57b2a4c39f6c237dd9c

  • SSDEEP

    12288:CxIK9V14ImyHYbIj8Ocbwc1T1hWm5NJ45:CJEyYS8NnRnWmXJ45

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\530450a00e01282f2d44c47d602f0b80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\530450a00e01282f2d44c47d602f0b80_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\ProgramData\emafrb.exe
      "C:\ProgramData\emafrb.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3120
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1412 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\DumpStack.log.tmp .exe

      Filesize

      410KB

      MD5

      42b855dae5a94b5c98e751163bf2fca0

      SHA1

      080a5affcfa0cb3a9aa32a25f2f613ddcf06a808

      SHA256

      6d776609428da72199eb9d8f0cfb74071f988054184e66aa6605376edd57e925

      SHA512

      dd87a8a1c58b41c1506f5a0eb528635c0788fafa9c46d92bc0da65529d936adc90e2e5b7db7752bb93c335c08ab9589805e8c8e406b256872d4ab349afdaf80d

    • C:\ProgramData\Saaaalamm\Mira.h

      Filesize

      150KB

      MD5

      aef10b9ba25f907727558514f2dfbab0

      SHA1

      d67383ef1b23d4da72339d66de9541c2e1efaf53

      SHA256

      f5e77ddc706f6dffe056dc2f8a88adece36e0e4552bc70a85f36b1e01fe547ad

      SHA512

      5e607a70ca3fa489897f8df0c96570709839364cd8cabd5f76386dfff01ca2986d50c120cf82926dff950c7d7b6ec833ea7558b64ec8f0dfe2e5070abf1da103

    • C:\ProgramData\emafrb.exe

      Filesize

      259KB

      MD5

      cdfd9e28d40bdedd4361d9cca0014b1f

      SHA1

      5f9d1751b25b57f249715faec30cbab11f95693c

      SHA256

      17b9b4f334a0efdf3862428df3ff7d06befe8042c36c9d1b395f7b9b88409e82

      SHA512

      43d8a17d5f8a034ab970b1d8974e59a3a12a4f3fa4d08e629431f04bd8a35c9c687fcd7ac1a0603b22300dd07a59615f3490be8b87f2cb6e463c29bd5c680aa9

    • memory/3120-72-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/3120-197-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/4284-0-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/4284-1-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/4284-12-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB