Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 00:48
Behavioral task
behavioral1
Sample
18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe
-
Size
134KB
-
MD5
f8eea34b5699e461dd45621e2f0c5500
-
SHA1
a028e6815c353bd7dff416a4b9b1c3cdc1851be0
-
SHA256
18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc
-
SHA512
e081d8b205c1b68f21e647d8b7c33b61cce4b5cb4f034b6cad715250238683f8ae3cd3860c7ba0e315fb1e69f78ee9137f69d569c0b386fdc50bc6191d0fcc74
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qn:riAyLN9aa+9U2rW1ip6pr2At7NZuQn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2236 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/1724-1-0x0000000000300000-0x0000000000328000-memory.dmp upx behavioral1/files/0x0033000000013f21-2.dat upx behavioral1/memory/2236-6-0x0000000000C00000-0x0000000000C28000-memory.dmp upx behavioral1/memory/2236-8-0x0000000000C00000-0x0000000000C28000-memory.dmp upx behavioral1/memory/1724-9-0x0000000000300000-0x0000000000328000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2236 1724 18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe 28 PID 1724 wrote to memory of 2236 1724 18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe 28 PID 1724 wrote to memory of 2236 1724 18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe 28 PID 1724 wrote to memory of 2236 1724 18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\18cb30fcd5b1747c9bc3bd42f517d1130d4eaec35a12a54376ebeefaaeb341dc_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD53b540fd48514494997272dcd7488d8f4
SHA1ea3044c541dcfff1d7b76935971299ff6f75850e
SHA25629fa67ae8b4eef7870f52ecc765d80c8927411c48b94f18e6c95c2a825d25698
SHA512258cd1b54c0967b593a70d388d8ec21a06c3970021bd4a54086e6804cc39624c5a260707937f71de65b15e9cb74cb86a567f549433bc51276746cf7060f10aa3