Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 11:18

General

  • Target

    593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe

  • Size

    3.0MB

  • MD5

    711447ef8b390e33f11acc2329ee3dd0

  • SHA1

    1489a6574eb70f05096aea2a4692563d28d1f8a5

  • SHA256

    593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4

  • SHA512

    4e949a4b12fb56cf6be45ebc121968d6095a7213c3a14b59aa05303cd96d26b93d8e9ad51b2e86b9b4a2393aeeac35573073fad41e3af9104a02c2cdd0b236cc

  • SSDEEP

    49152:R4OM6V64Ks5kDiopgGgr1GblGkUmmXON7j5GLMg/gRbOEdeQBXWaJHdfT:Rj1kPDiB1GJGpmmG71GLCdXfHp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe

    Filesize

    3.0MB

    MD5

    2a3ad0c994ec428b92078824b7396cbe

    SHA1

    53285e8d5928751016cb328d0d8075809ec6ca64

    SHA256

    888d67fc1545f85b1e5e7e39c3fda7ac5b9c704989463c064d92a9da2e48d2dc

    SHA512

    e37eebc4e18c21355d69072e0fbefa1dc9a20a82a8caef5b7164278ab13aaf8a81b562129113c5d2f227f97a863585d80d4973445525d477516d15961943f734

  • memory/1968-0-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/1968-7-0x0000000002EA0000-0x0000000002FB5000-memory.dmp

    Filesize

    1.1MB

  • memory/1968-10-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/2304-9-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/2304-11-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/2304-17-0x0000000002ED0000-0x0000000002FE5000-memory.dmp

    Filesize

    1.1MB

  • memory/2304-34-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2304-39-0x000000000ECD0000-0x000000000ED73000-memory.dmp

    Filesize

    652KB