Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 05:04

General

  • Target

    374896714e9024c89c445cbc18cc75d51474e3e285dba06c2b96a07865154944_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    0c945c424b55da427a1007a6d925a310

  • SHA1

    0adf7658b7e8b9b5b02973080b4e38f47220f4c6

  • SHA256

    374896714e9024c89c445cbc18cc75d51474e3e285dba06c2b96a07865154944

  • SHA512

    8989a37c01314daf07f34caa788e4d90d9588b56f3c69f7cf9b6c8bba5fee6696010bb96483ffee4ac1d511a70dd63f4a5404c7a5cc90945588d59a6e30ffe7d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WK:LJ0TAz6Mte4A+aaZx8EnCGVuW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\374896714e9024c89c445cbc18cc75d51474e3e285dba06c2b96a07865154944_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\374896714e9024c89c445cbc18cc75d51474e3e285dba06c2b96a07865154944_NeikiAnalytics.exe"
    1⤵
      PID:3160

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-Rag5P5y1oQC0tPP9.exe

      Filesize

      83KB

      MD5

      7c9885feda2a2009bbeb308be469ecc2

      SHA1

      5dd9e9b1fbf85b5b288d3b84f6b0c0d506b90e66

      SHA256

      b3fa1a8e8baf11d9229c1a6db80149f196823d0bbe76d58b4e7ce4f5b0119633

      SHA512

      d5d1a7b5fef602cb6ea1ba1b3569a47dbc10be1fcb72b0c3554e6f4b15e8a9a83d42925838f35cc9c6aad74d97b54b42b8f1b018f9c0ea5147c1611cec797de9

    • memory/3160-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3160-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3160-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3160-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3160-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3160-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB