Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
98a905235a42d7c38fcf83580d259360_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
98a905235a42d7c38fcf83580d259360_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
98a905235a42d7c38fcf83580d259360_NEIKI.exe
-
Size
2.6MB
-
MD5
98a905235a42d7c38fcf83580d259360
-
SHA1
3fd557d3049675e9f676b02b0d0e81eb2792dace
-
SHA256
b59b8f04ac20aa3b9a374e37d1d956837ad8f99349c09c54619b19041a05c5c9
-
SHA512
eb115a105ef725f807c977146dd39dcf5d287b3b77978c36222573dcb26a22fe044c74ba5a4c626e4fc31dd46da07791630326a8c909862355f98d5d97aee0f3
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB3B/bS:sxX7QnxrloE5dpUpwb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe 98a905235a42d7c38fcf83580d259360_NEIKI.exe -
Executes dropped EXE 2 IoCs
pid Process 2936 locxbod.exe 1880 abodloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeSU\\abodloc.exe" 98a905235a42d7c38fcf83580d259360_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB2C\\optidevsys.exe" 98a905235a42d7c38fcf83580d259360_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe 2936 locxbod.exe 1880 abodloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2936 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 28 PID 1720 wrote to memory of 2936 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 28 PID 1720 wrote to memory of 2936 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 28 PID 1720 wrote to memory of 2936 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 28 PID 1720 wrote to memory of 1880 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 29 PID 1720 wrote to memory of 1880 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 29 PID 1720 wrote to memory of 1880 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 29 PID 1720 wrote to memory of 1880 1720 98a905235a42d7c38fcf83580d259360_NEIKI.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\98a905235a42d7c38fcf83580d259360_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\98a905235a42d7c38fcf83580d259360_NEIKI.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\AdobeSU\abodloc.exeC:\AdobeSU\abodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5d997f0fcac846b72b66b7ec3276a0eb0
SHA144ef750ce9f1bc920ee5e3974b20439c47b25f23
SHA256756500e116dfe7b87885bf887a7d68976a7f7476d07d99e2c1bd3ef62f2c25d9
SHA5120154889c32ff0f2243d2f1c165b36278fed32d6849c78ae9cc3865fd6e5c6e2848d9f5a859b24ba52fba07b52e771213383abc891a0f7d0db680486f5114fffc
-
Filesize
15KB
MD510e6df3619bbbd1a2464d5000a56fbb5
SHA19080f324c059847c04fbc434d62d8ab2e06140a9
SHA256e437e0733cdde421f32dedbcb49fb69873f23116dc2523e2a45b18e005fd1559
SHA5129cf956066c20f94e36fc21e8c536ef7625e51e279c3c9794d5029cac42d155db5a2e79ccfe4010364e50c34b0675745a5fc121a112892a31b331ab14427ac6ff
-
Filesize
2.6MB
MD573807f78ce2b9d670923751dc92043a1
SHA114895075d4e4027a7260b715e71a4bbdaeb51110
SHA25649084419ca348b0bea8385c18880300c3c1b519a465195ee0ad589c7761b819e
SHA51237f53c9aef450482776d1e7d48094008fb2d61661becff2d87527bd62cd95ed1654c1e9b288200195090b0490e55188e19f3e1bfff2215e59ece218092ff32a2
-
Filesize
171B
MD5a5ab352b6a8cd2d832c400fe14f5f860
SHA1b489749a5de861fe405ba79b9ead71493002ac93
SHA256e376af06126f4e610201837747bf699dd4596cc66fc1ab15454f3c1842da4018
SHA512bb450afdab912610e2b41baeb9e3018ffeb3fb3b4ec17a90d7d82b1c6c9ccbb49eeb1ec1eac26940db7261ea14c37e170e291ef8f56aa6c34172dd878032d172
-
Filesize
203B
MD543a500c5496c4006293d17f69f04a4c3
SHA105af026709cfbf0db5f6db5a29bc645fdb2ed510
SHA2565e087974ea7722d844f8d6057417329d4c4c37f39b4745ce5adca833d20144d0
SHA512ffbf8adf3788dbd1fadf80d89d1ce03364887c673173a63effc5a5593e76780d4c4d79f9a682d2b6407600a308302452cd2b1d082c9d01ee94502bdcdb11c6dd
-
Filesize
2.6MB
MD5b5142f608206396793b510d1401717f2
SHA1eb5e1b450a0584c04343bd2329220baadd541c19
SHA25629088a9d66bf0a02e8655eeddf167b794a742c330e1c5b464a13cc61888f4289
SHA5127224a21b7a4184666479a5e47b3d5edc13f5d4953b810a140499bc7c971b802999b060f8073444fe61e3b437bffb7417598e1179b15bd0e5d6d15a1c22a4a6d4