Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe
-
Size
38KB
-
MD5
e802161642b621f59aa18d6436f79980
-
SHA1
bcac39580b488ce48b288a75fcb2d36a255df5bd
-
SHA256
819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb
-
SHA512
ef2181faf25c9415039084ce1bbf8769d50816681d8d5311e6d9543beaf24cc08de119937350f7652ea2209f7778cbb8878651ca8754e18857e937773cfb8b22
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhc:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1020 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1020 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3736 wrote to memory of 1020 3736 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe 90 PID 3736 wrote to memory of 1020 3736 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe 90 PID 3736 wrote to memory of 1020 3736 819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\819d80cc4044455072ce34b867b6a853399a6fe4404fa5d074776912541c25eb_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4416,i,7869973516895866428,11647313872437892197,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:81⤵PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD51bea70dcb127641f41a21aca63111d69
SHA1df79df54d931d6f639e910a94fc981d6814006bf
SHA2563eda6d57d673dd668121c5a9261fc39b28f4a52c5634023fce1048b4d7ba891a
SHA5120b62f5c9b868dd7d55494ea9210c438911d85cd1114242d86eb89f064e0de5f7d12b05d77b992d1ae94937b11f23634e5e5c051bcba2fe16b59c54ff5f0eacaf