Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 17:37

General

  • Target

    0973394643c3f171afb02a6448e454b08b16dade403d63576ea60ca553ffb776_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    ef124c67c0aef7169eabfdcb40f965d0

  • SHA1

    7a7463c75156e6e56aaed82aa6217056b79b63c2

  • SHA256

    0973394643c3f171afb02a6448e454b08b16dade403d63576ea60ca553ffb776

  • SHA512

    32c52953287fa3b3012de8ddddb9bdbe84e0f1c2566bb92452214ea468230165359762f268cdc8bb7dd913e7438022b0df6aad43a1ee1729748c2cafca8ba4de

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oK:LJ0TAz6Mte4A+aaZx8EnCGVuo

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0973394643c3f171afb02a6448e454b08b16dade403d63576ea60ca553ffb776_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0973394643c3f171afb02a6448e454b08b16dade403d63576ea60ca553ffb776_NeikiAnalytics.exe"
    1⤵
      PID:4416

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-Mhy4NR3UTtaytxJx.exe

      Filesize

      83KB

      MD5

      a1123c7500a2e6da4faceb979388f89f

      SHA1

      a8e9e64caf1f7eab620e3bf56811a496a6db8cc1

      SHA256

      796b617936a2805af5421a24864893df713c24e9a1c44409b29a523cc2a2ebd4

      SHA512

      85ad722afed75393753dac6736f542047a204701dde2ca9123b231b2edf1b10b569d5a5be728c5220b1b73e6289db24ea1202d33810014b45c5c007e1a3b5a4f

    • memory/4416-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4416-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4416-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4416-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4416-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4416-29-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB