Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
712d1902ce07547538478af75b554fc790f38a140051ba78dcbbd401d9e28daf_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
712d1902ce07547538478af75b554fc790f38a140051ba78dcbbd401d9e28daf_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
712d1902ce07547538478af75b554fc790f38a140051ba78dcbbd401d9e28daf_NeikiAnalytics.exe
-
Size
79KB
-
MD5
98168a3527d5b9d8e46e099140a18130
-
SHA1
0ad424cb18a302af8a71320641749c0d0297d2ef
-
SHA256
712d1902ce07547538478af75b554fc790f38a140051ba78dcbbd401d9e28daf
-
SHA512
c921ff71319624789e59f363fd6f8248b27c3f72d507c6c56f36b0a750d9f5912f4b351174214048d88300d5a4e5a7ae997f19c56b0ccd92e425690a5ad7b403
-
SSDEEP
1536:zvjDnhhh6RomOQA8AkqUhMb2nuy5wgIP0CSJ+5ygB8GMGlZ5G:zv/n16RojGdqU7uy5w9WMygN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3792 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3424 2580 712d1902ce07547538478af75b554fc790f38a140051ba78dcbbd401d9e28daf_NeikiAnalytics.exe 84 PID 2580 wrote to memory of 3424 2580 712d1902ce07547538478af75b554fc790f38a140051ba78dcbbd401d9e28daf_NeikiAnalytics.exe 84 PID 2580 wrote to memory of 3424 2580 712d1902ce07547538478af75b554fc790f38a140051ba78dcbbd401d9e28daf_NeikiAnalytics.exe 84 PID 3424 wrote to memory of 3792 3424 cmd.exe 85 PID 3424 wrote to memory of 3792 3424 cmd.exe 85 PID 3424 wrote to memory of 3792 3424 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\712d1902ce07547538478af75b554fc790f38a140051ba78dcbbd401d9e28daf_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\712d1902ce07547538478af75b554fc790f38a140051ba78dcbbd401d9e28daf_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exePID:3424
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3792
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5600b5f85b99f5cf4785c0c2906d26a18
SHA17132b970404d295ed0b1b98a76da2c97cc7fe364
SHA256d9f32237de01b5072cf5751915231dd5dc043775a8970729cf8c6fe1ea91766e
SHA512ef4f90a5838d90e2e21c34af9a72033cdae59b936d2dd7875d325898fbf073b3eac311fd521f296d90b3fed6262edf08eb9a9841b8f877a271737391c5bb53c8