Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 11:54

General

  • Target

    8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639_NeikiAnalytics.exe

  • Size

    90KB

  • MD5

    80d2a1552f4db9890d2c2dc118f02040

  • SHA1

    e8d9056fb113d088dc68e622479e29a0fbdc907d

  • SHA256

    8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639

  • SHA512

    49c2c6b34c288ea8a1022e55fbab96a1ac6c15ad2a3048cfbeff1191dcfd476006b3bdcb3b485925cc5a6fb388e0617a929e409aabeb9c889bba8d7c9651ef7e

  • SSDEEP

    768:f6F85fJTL9dKzMomchzSyohdjTRg5EZl3HQbfEDOKS++ojbVOOf:Sq51WzMvcdSywJdjl3wFs+dOf

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    PID:3984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\USR_Shohdi_Photo_USR.rsu

    Filesize

    90KB

    MD5

    80d2a1552f4db9890d2c2dc118f02040

    SHA1

    e8d9056fb113d088dc68e622479e29a0fbdc907d

    SHA256

    8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639

    SHA512

    49c2c6b34c288ea8a1022e55fbab96a1ac6c15ad2a3048cfbeff1191dcfd476006b3bdcb3b485925cc5a6fb388e0617a929e409aabeb9c889bba8d7c9651ef7e

  • memory/3984-6-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB