Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 09:20
Behavioral task
behavioral1
Sample
7364939f602a5716e21c1c2758808113ffbfa4e143d3901b90442ca18f898042_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7364939f602a5716e21c1c2758808113ffbfa4e143d3901b90442ca18f898042_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7364939f602a5716e21c1c2758808113ffbfa4e143d3901b90442ca18f898042_NeikiAnalytics.exe
-
Size
450KB
-
MD5
0a3790c783a0f790a37d4da2feb02680
-
SHA1
a5411234c324fb01012277d5cf81dbdcedcf106d
-
SHA256
7364939f602a5716e21c1c2758808113ffbfa4e143d3901b90442ca18f898042
-
SHA512
5ddba731256c20a106fe1a91216ffa5982421c3860ad5e22aab4d1358a6d19182b3b97735ca949f8dd58e803b04365b1f2bdc03b8c1ae940db9c20359033815b
-
SSDEEP
12288:NJu6lfyi4fabr9jy4BNKOSuDVh+vh4tH1jo3rqsh2h:N8XfyhLNKQVhKutH1jo3PhA
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2316 eccstpf.exe -
resource yara_rule behavioral1/memory/2236-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x003100000001313a-5.dat upx behavioral1/memory/2316-7-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\eccstpf.exe 7364939f602a5716e21c1c2758808113ffbfa4e143d3901b90442ca18f898042_NeikiAnalytics.exe File created C:\PROGRA~3\Mozilla\qtlrtjl.dll eccstpf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2236 7364939f602a5716e21c1c2758808113ffbfa4e143d3901b90442ca18f898042_NeikiAnalytics.exe 2316 eccstpf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2316 1980 taskeng.exe 29 PID 1980 wrote to memory of 2316 1980 taskeng.exe 29 PID 1980 wrote to memory of 2316 1980 taskeng.exe 29 PID 1980 wrote to memory of 2316 1980 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7364939f602a5716e21c1c2758808113ffbfa4e143d3901b90442ca18f898042_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7364939f602a5716e21c1c2758808113ffbfa4e143d3901b90442ca18f898042_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2236
-
C:\Windows\system32\taskeng.exetaskeng.exe {721DFBAA-6DD8-4367-A6FD-4C828C65D86D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\PROGRA~3\Mozilla\eccstpf.exeC:\PROGRA~3\Mozilla\eccstpf.exe -ufgsyxd2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD50009a973194eb20129a30aca380dafb4
SHA12dd03eed72aa479b0884e88d1b7ae657f40c721d
SHA2562915fd9e7762e593ba3ca10eb2a31c08ffb6512b117522a9e9bba4157c572bf1
SHA51248ff148426cc51d8f377eed1f1ba49a828527955f56406304b3465633967b37d1d8e2fe66a1512c972efea090866969969772e0395ee132fba55317b8f5ee851