Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 22:44

General

  • Target

    5668ba9a4990b618363ce7452b13c700_NEIKI.exe

  • Size

    3.1MB

  • MD5

    5668ba9a4990b618363ce7452b13c700

  • SHA1

    35f004ac8c4330b1e3e8715f5ff9606368694065

  • SHA256

    58003668c5097e85380da3d3155e672a25c29dadf5f37110c640137c7d2b4d85

  • SHA512

    d74903722f20aaf12a6bf3a047cd61a34719b3fd0a2c857600da87eec37f71d0bd9d5fd1d87632230b80ae1589298a5cb6c8fed5916dfbea84bb9a4f17c58cfc

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBNB/bSqz8:sxX7QnxrloE5dpUpKbVz8

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5668ba9a4990b618363ce7452b13c700_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\5668ba9a4990b618363ce7452b13c700_NEIKI.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3208
    • C:\UserDotQ5\devoptiec.exe
      C:\UserDotQ5\devoptiec.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZBQ\optixec.exe

    Filesize

    3.1MB

    MD5

    b4bca3dd4aad253f17be29d93719df9b

    SHA1

    a882a75533abc511ffdb1e0a42dc463a51089994

    SHA256

    7b372b7acf9608de3d7f429d5d769cce3e779ef6fe67ef2d9d5049bf64fbb085

    SHA512

    cf32d2c9b49aaa2c2e0723662d5c5ddba10b2638ad3aa9ab53363896d36a821b10638e092bad43cdef9cd3f154ee8d83e313120d9d85b2bb872c37872b5f4d3a

  • C:\UserDotQ5\devoptiec.exe

    Filesize

    3.1MB

    MD5

    5483073745e1cdcf3015048e7010dbfc

    SHA1

    9d984b319bf3272754a012420d405115193e79e7

    SHA256

    4035c648931b05342ec14a18eb84ed60d024a111a023b3952bd09e9ef7b3ce05

    SHA512

    367ba022ff2457605a403843628c3359ec1076c4970d8cda68e3ac8f4e5c5e2c982c8fdb99d19a7336b95cd6b34fab0a3e720f90af3a3089a86e91d43b06ff13

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    207B

    MD5

    73a3e73c5c57eb2a7aba99bdcd05a5be

    SHA1

    0f496ade630f8e5e7b37224944425b84028db237

    SHA256

    fb83c0b91eb9a26f9af3ebad9a97d8af96dbe03eebf0f26df7d2567e4f79e3c1

    SHA512

    c19679afe7c9f510769019b4f8c732c74d83709cfcb7bb0e0441264cd2824ce603c49c42182c3ab4446c5927bb44d5b888310377a2a696d8a569201fe3d2c040

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    175B

    MD5

    4807a91dddd788ed2fb08700a6e66c2b

    SHA1

    5b41b3dd1e0313aa0d0253c0f5cff5314085ac94

    SHA256

    3392f2f698d10b9025fc289be86a2efa1dcc4738cdde37f5184a403e9ca84435

    SHA512

    45d44038bbffa08a7e644cfc3d899412e98634b21182dc3dbbe414c27f138f979eec79fb6858eb527adec3027f9f73b15d99a4fcacfba391cd7698380eb44295

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe

    Filesize

    2.1MB

    MD5

    adaa8e0726d880fc347d63182f759017

    SHA1

    119dc0ad35ddf9ae8c5d73896311bd6a2ff34029

    SHA256

    072a7b4e9fd98ee649ebd559b79663fc7431d48ac9c57138b04147ea508a8a1e

    SHA512

    ada0c33a44aede85cbde71de9525e692154d955c0f4b4d4e137a9164a4726ac2a043254b1b4e6617a97567f47498c7388d5b4202a35f8328112645e37349c616

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe

    Filesize

    1.8MB

    MD5

    5f56cd14a7959bb3ef7c4ba2068597b0

    SHA1

    940f6e5f63b389a331d1c601710fbc8630743852

    SHA256

    afa755b16d2c49b41651d22a1aac301992bcb690b0c6fde777fb7ff7d5e5b580

    SHA512

    1c82509c99fb08cccf54fbd17787a7e3ff49b848af0d052cabeb64ea6ba3d22aaad3cac701200773fb6e2965622926b70a6ddb6e07f7bf34c2d04b6b905d1fdb