Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe
-
Size
3.0MB
-
MD5
67a7e6ad2fc9257dc69883fcc0db82a0
-
SHA1
b0814478ce7a05d003b6c062fa41c0654cb35d8b
-
SHA256
6ed13cd098496ed202cdbb34f3aef62247b88847ef43d444ec0336c4be03a98b
-
SHA512
f50a3bb574000c30cce4f813eea335bbd647cb79402898ddcc3cc2dc81e172a29c5784cd7380d4525b1dc605f548211628e9988c4239917e4d6120be2ebde09e
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBtB/bSqz8:sxX7QnxrloE5dpUpibVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe -
Executes dropped EXE 2 IoCs
pid Process 2784 sysaopti.exe 1620 xoptiec.exe -
Loads dropped DLL 2 IoCs
pid Process 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files7L\\xoptiec.exe" 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBK7\\optixloc.exe" 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe 2784 sysaopti.exe 1620 xoptiec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2784 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 28 PID 2860 wrote to memory of 2784 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 28 PID 2860 wrote to memory of 2784 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 28 PID 2860 wrote to memory of 2784 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 28 PID 2860 wrote to memory of 1620 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 29 PID 2860 wrote to memory of 1620 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 29 PID 2860 wrote to memory of 1620 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 29 PID 2860 wrote to memory of 1620 2860 67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\67a7e6ad2fc9257dc69883fcc0db82a0_NEIKI.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Files7L\xoptiec.exeC:\Files7L\xoptiec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD57ecc236190c5bb025e7666ac26dde42d
SHA1b66513fdb57b0233e3417525d80d6e04ab7d7dfc
SHA256c52fd047942400cfe24debb29e86e05c9cb80efbfc82c24cfcef4a3349936ceb
SHA512f70263256601be52cf29ac252bed6e85412671279a6092e60f67ec3877996c9094058ea0399f2dbadba64e9e51efe4970684600bd85f31614f9ca39d9962a71a
-
Filesize
2.3MB
MD554e3c198720b4ee7f2d8d5e9c318c698
SHA1b74599bb5fcbd4c3f197ae50eb7073a0170c98f1
SHA256b64f8c11bd4179a9122da78c2766104cc28651c90ec767c25fc25a5f31ad6f3c
SHA5128645ee968e18283f0e36182c8974c18981ef29e0e030b052cde920e5cef82c06cb2fbad8916c2605cec83cc4537af27a8da8aea549d07a15c8f553d58415852f
-
Filesize
2.3MB
MD5e825d5e5b35062360b2c32d1117a1a50
SHA1be79d0aa92c0812b30ac5a1b672c6e5e9d81657f
SHA256c9592fee481ebb4dac2f7c15763ab6880d73b364d59e446f68d96a2f83fbbf0e
SHA5123284a84667121b4211c13ab56327d8aba1124dbb4bbcf099a5f2ce25fc15146fd189b19f71841b9513c50157942042bd21a55e326d2ab99f21d3bfc48640da59
-
Filesize
1.9MB
MD5c29ca554b2d51bc91a74bba218cadf6b
SHA1e54997d90f515d594c3ace31712ab3912d6f886a
SHA25609c4c6926a63910b01f9272e813dd0c7f9a8643d777913d519aed25c24d7f5ab
SHA51202ecf26a7b46843e90ee3041df614bc4b44477d763133efce0eef13095aa9a42f3094e933f5d24d0de1d3da4f468a7006e95d20701a3c9ba09f53b3959a17c96
-
Filesize
170B
MD52e78fef0b06d7f55e1326a0f0f631be4
SHA1d5922fa63b2f5482b75380699bd81a34d0a22978
SHA256cefa38b64489eb2ba28489ee1a5afe81709ca9a1c9fc786b26456a2ad4d78d65
SHA51245a465bc05a9fccbfdf8dc411edf44349e09b7a52d383af8bd6216b291629cbf47e67535cda5530b37bf1f9c7943bc102079f7c1863cbffd6e6c1909bcf4ceaf
-
Filesize
202B
MD504c5f7c995fa0646ab5de9f9f760acb2
SHA114a2c8b4c5da876b9952593be8d3ed46c38a7c4c
SHA256e316caecc4faacf02870f84bdf4267065b431612817a156257171f7803e240f0
SHA512982868714fb7a461ee690f7bb581c4929a14a5297bc2263a7dd0e32be9ef78ebb64d9c6d034875b65e7ecc1e5696c2091689a1c614a5019ea7875fdd6db08d03
-
Filesize
2.3MB
MD54b08d4d8cbaade9b2914daa5937ae6c9
SHA13e39df620b50a1d6d43ae635ab4ebe99f130e9f4
SHA25639e370d951291b0249490565c9e6b0a70828be4ae33776e7c68c83578232a54c
SHA512f7dde65042e729fc5d66702660071d07d6ab0c8a765fce2207570fafbf078a57e5f04d294ed2d43657f1eab77b9ade662f33b7377b7f578559b9307657844596