Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
30/06/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe
-
Size
67KB
-
MD5
1cf436f011a7775e6c04ae1ac46c9890
-
SHA1
52497f5da7648edca087ab927b61c53ec2313949
-
SHA256
05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420
-
SHA512
90bb2f5feccba57383810009cf7d21bc71267ecb76052a047a6648444267e14617a1a1809bf1c68d82ba6e7d79672f8b20d45d9fe2ed44a520abfd38bcb5729e
-
SSDEEP
768:6B7HBXFw82t2C80lyaZ4jX05Rfw/MKPsED3VK2+ZtyOjgO4r9vFAg2rqs4mkesFp:u7HZFwzlyaZTQkKYTjipvF2TZ0F7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1696 cnwog.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1696 2216 05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe 28 PID 2216 wrote to memory of 1696 2216 05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe 28 PID 2216 wrote to memory of 1696 2216 05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe 28 PID 2216 wrote to memory of 1696 2216 05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\05966f6c169a38f0bec9cae3465292e2099aed3fc5188c26b7c71b25369d6420_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\cnwog.exe"C:\Users\Admin\AppData\Local\Temp\cnwog.exe"2⤵
- Executes dropped EXE
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5e4d53991ebda5b528ad2a05d8183fe5e
SHA1a6ce60cf4afb3f3eea9255dc4a96d5219ee523fc
SHA2568b4ce6a47ae5f62ed4660a6e92ea3ce4411662422280a2d6f6a55ad28c069734
SHA5127fba9a2c262049785e34f933b63334003bc01a99e9caf0e7911a9160ff54a67311e795ade676efbdac59abcfdc8c1cd98cff2a2a3a28f43d3d345fe504668e7f