Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 05:44 UTC

General

  • Target

    3ac94c4273d225daa1231af286b3909b848676e0107fe941cf3bed8e7928c9db_NeikiAnalytics.dll

  • Size

    32KB

  • MD5

    33a8c784494617c5cc6aab8d059543b0

  • SHA1

    ebfcf60d663608fe1e4c275bcaab1e949de65f3e

  • SHA256

    3ac94c4273d225daa1231af286b3909b848676e0107fe941cf3bed8e7928c9db

  • SHA512

    1a6039ec13932780b20d2fbc50d85c45d21e1e08a486e6b12beb94f76b1b4e12cfe2ebbafa0f72d544cc28795912ad4ce3bed048f77fdd6907213a148071adfa

  • SSDEEP

    768:3cVIAkhbmrpVOt0Jd3Th9V3NfrMLFBsjhy1Ms3yRghHCv9ytVjwV:3z5bmrpVNJrNfrM8jhy33GghNM

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3ac94c4273d225daa1231af286b3909b848676e0107fe941cf3bed8e7928c9db_NeikiAnalytics.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3ac94c4273d225daa1231af286b3909b848676e0107fe941cf3bed8e7928c9db_NeikiAnalytics.dll,#1
      2⤵
        PID:2604
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:3780

      Network

      • flag-us
        DNS
        154.239.44.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        154.239.44.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        97.90.14.23.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        97.90.14.23.in-addr.arpa
        IN PTR
        Response
        97.90.14.23.in-addr.arpa
        IN PTR
        a23-14-90-97deploystaticakamaitechnologiescom
      • flag-us
        DNS
        71.31.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        71.31.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        196.249.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        196.249.167.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        58.55.71.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        58.55.71.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.31.95.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.31.95.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        86.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        86.23.85.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        140.71.91.104.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        140.71.91.104.in-addr.arpa
        IN PTR
        Response
        140.71.91.104.in-addr.arpa
        IN PTR
        a104-91-71-140deploystaticakamaitechnologiescom
      • flag-us
        DNS
        0.204.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.204.248.87.in-addr.arpa
        IN PTR
        Response
        0.204.248.87.in-addr.arpa
        IN PTR
        https-87-248-204-0lhrllnwnet
      • flag-us
        DNS
        152.141.79.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        152.141.79.40.in-addr.arpa
        IN PTR
        Response
      No results found
      • 8.8.8.8:53
        154.239.44.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        154.239.44.20.in-addr.arpa

      • 8.8.8.8:53
        97.90.14.23.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        97.90.14.23.in-addr.arpa

      • 8.8.8.8:53
        71.31.126.40.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        71.31.126.40.in-addr.arpa

      • 8.8.8.8:53
        196.249.167.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        196.249.167.52.in-addr.arpa

      • 8.8.8.8:53
        58.55.71.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        58.55.71.13.in-addr.arpa

      • 8.8.8.8:53
        86.23.85.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        86.23.85.13.in-addr.arpa

      • 8.8.8.8:53
        18.31.95.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        18.31.95.13.in-addr.arpa

      • 8.8.8.8:53
        140.71.91.104.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        140.71.91.104.in-addr.arpa

      • 8.8.8.8:53
        0.204.248.87.in-addr.arpa
        dns
        71 B
        116 B
        1
        1

        DNS Request

        0.204.248.87.in-addr.arpa

      • 8.8.8.8:53
        152.141.79.40.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        152.141.79.40.in-addr.arpa

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.