Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe
-
Size
38KB
-
MD5
e802161642b621f59aa18d6436f79980
-
SHA1
bcac39580b488ce48b288a75fcb2d36a255df5bd
-
SHA256
819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb
-
SHA512
ef2181faf25c9415039084ce1bbf8769d50816681d8d5311e6d9543beaf24cc08de119937350f7652ea2209f7778cbb8878651ca8754e18857e937773cfb8b22
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhc:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1760 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1760 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 1760 856 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe 28 PID 856 wrote to memory of 1760 856 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe 28 PID 856 wrote to memory of 1760 856 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe 28 PID 856 wrote to memory of 1760 856 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD51bea70dcb127641f41a21aca63111d69
SHA1df79df54d931d6f639e910a94fc981d6814006bf
SHA2563eda6d57d673dd668121c5a9261fc39b28f4a52c5634023fce1048b4d7ba891a
SHA5120b62f5c9b868dd7d55494ea9210c438911d85cd1114242d86eb89f064e0de5f7d12b05d77b992d1ae94937b11f23634e5e5c051bcba2fe16b59c54ff5f0eacaf