Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe
-
Size
41KB
-
MD5
7a5780ffe34014be8bf1e63c79bd2eb0
-
SHA1
5e5040bfd1efb8841eb312202a7de01146833118
-
SHA256
4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0
-
SHA512
6a633eca1c96d2542d9139741dde899369ad56c6aa1b0645eab71121ab3ebff99ef2f5448632816a13da24ce0cd47007290b6a803a5a3e8e863c6355fe50df69
-
SSDEEP
384:DLR7iSYIwM+6GyXzQNSOwOmOzO6iQspWGqYx1jYCKt7VpEi6xX+K2OexXjbuR6x0:DLR7ix70zQozpW7YYCqgiQ0OEmAmMn9O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 lasis.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe 2236 4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2360 2236 4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe 28 PID 2236 wrote to memory of 2360 2236 4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe 28 PID 2236 wrote to memory of 2360 2236 4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe 28 PID 2236 wrote to memory of 2360 2236 4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\lasis.exe"C:\Users\Admin\AppData\Local\Temp\lasis.exe"2⤵
- Executes dropped EXE
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5072fd937a545e49e0062fa72a6a5c077
SHA16d3ebe0a0f4ef2059ea6d715ede422f3498eab72
SHA256b728be6fb9715aedd9e7abf84968b7201d8faa76a3958fba1d1e23e124103143
SHA5123746fad905a1981b57faaacc45959923273b223e6ec412a66910a8a055975b78bf6203b9acb1f1a095d0d5815636dfc249560ab97574c5369125dc123cdb1002