Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 13:00

General

  • Target

    7684d4bf1a92a121d57cc829cce3f4b2e81a8730137162ca1f703df3c45e1886_NeikiAnalytics.exe

  • Size

    94KB

  • MD5

    2b923dc9fb59396415f357e7a0795970

  • SHA1

    b7b7ee8c3f44e1e9deba5ee468b6f2b572238dbf

  • SHA256

    7684d4bf1a92a121d57cc829cce3f4b2e81a8730137162ca1f703df3c45e1886

  • SHA512

    fe10abf90b82932118e05698a2979aacda490c472b69038fd8439cc79093551b9170f31d7a02ed989f69dcccd1e54a61bb62c661398b29555b8f4a53d03ea0bd

  • SSDEEP

    1536:PGYU/W2/HG6QMauSV3ixJHABLrmhH7i9CO+WHg7zRZICrWaGZh7uZ:PfU/WF6QMauSuiWNi9CO+WARJrWNZu

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7684d4bf1a92a121d57cc829cce3f4b2e81a8730137162ca1f703df3c45e1886_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7684d4bf1a92a121d57cc829cce3f4b2e81a8730137162ca1f703df3c45e1886_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\ProgramData\Update\wuauclt.exe
      "C:\ProgramData\Update\wuauclt.exe" /run
      2⤵
      • Executes dropped EXE
      PID:4956
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\7684d4bf1a92a121d57cc829cce3f4b2e81a8730137162ca1f703df3c45e1886_NeikiAnalytics.exe" >> NUL
      2⤵
        PID:2856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Update\wuauclt.exe

      Filesize

      94KB

      MD5

      86c9cf707c5f4e130ccac6b665afea31

      SHA1

      8e50bd107a5762a44c82d3a81f9b89113927d8a7

      SHA256

      f9c5d5424a28df4bdb426f993ff4b1ee5756e5ee9f58dcd21604b3952642c0cc

      SHA512

      5ca64d584cec99b0b43bf5390e39bbbc673a39933d73a21df6bc19ca8c7d013cf3151c826d642e5d40e72835bcb317094eebac4a160055ab550f7fd236d25b59