Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 01:57 UTC

General

  • Target

    9e658ebc1fbf4d03882778199ffc6cb0_NEIKI.exe

  • Size

    2.6MB

  • MD5

    9e658ebc1fbf4d03882778199ffc6cb0

  • SHA1

    0684311b9ff7bd9b361b203f955cfd07565af411

  • SHA256

    d2d54c7a601e12a485b2bef30178504df8cf0c1ecacab31c9a486beda20cbdab

  • SHA512

    c549cd0b0fc972cb90724d0539bb8bca23bf4875770618b15d7cae713f2e219284a9226429fcbf10196e122d4ace91a6f947008631d6a61d4ec822959431c25c

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBwB/bS:sxX7QnxrloE5dpUpXb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e658ebc1fbf4d03882778199ffc6cb0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\9e658ebc1fbf4d03882778199ffc6cb0_NEIKI.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1880
    • C:\IntelprocER\xbodec.exe
      C:\IntelprocER\xbodec.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocER\xbodec.exe

    Filesize

    2.6MB

    MD5

    4541c9d0bef3948c881333806b2f8216

    SHA1

    a6659ac00e1f582f9dcd63087c7ce17ff7950200

    SHA256

    923dc373bfc9dec4f15f373510a786e1fe33b2f8e3228431f0511580d4cc0db4

    SHA512

    670893dec11dae05ef7f282ca19a9ea30dca31c81cc902325910904f56fd44c3c4fdef87e22d2dc8a3706c0a5a9280993cb45eac5180ce17b2c4f07e5215d39f

  • C:\MintZ2\bodasys.exe

    Filesize

    2.6MB

    MD5

    17dd8a3e28ccd4473d4c4ff4236f3138

    SHA1

    098068fc884c740e7dd47670735e8dcf3e41b611

    SHA256

    6872d9bd4645cbde4acfb802fcf50ece10cf49ef84c838b51091e76dbf1fc6f6

    SHA512

    79265a90e25625e0edca241a7b0f23f5b82067a194bf8c9a4abe01be58c05d46d55e36d98695e5d86dde1cd882d38aa4a4ef794d8c3e5dcc56fbce785a1b6b2c

  • C:\MintZ2\bodasys.exe

    Filesize

    2.6MB

    MD5

    712aea9d36cd5b7c9ab5ca85e97470e2

    SHA1

    01012150895b07c1c3bd0f1f0b647e52f0448bb2

    SHA256

    859c28cf6b79bcdc136479db87c919b3242d0826ae9894ce2533c893f5a296e0

    SHA512

    cfdc8a20610b12aca3c7667b27d12465d42edc4dd81fc716aacf65a3258b7e35d74960563e07191b3e6e5d482978246ed007c958a031be6d5cca884385d8c95b

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    172B

    MD5

    415db45158fda1f00db79b954768337e

    SHA1

    d40aae8b93c8076a41a7711ace82eec5f7a92651

    SHA256

    01bef466bafe0d30442e27c15cbfa0b05752ab907815352491bea3862fe09b7c

    SHA512

    d6ef4ce24bc8789a8d3f9cf30120dcd6f88e20cfb920764cd9f3d8245ccf4a95605570f5f43a75b1d3a62af70e233a27a6822d2c8799b2d7ae115bb1f7c22d66

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    204B

    MD5

    17cd6124e14046a5b76205732587fd1a

    SHA1

    874220246f46ffb0f3af85cc4136bf653e1baf45

    SHA256

    ac8b6683f60c88c0f1db4bbbe6017c291bc1f032b83cc947d680a64ebe08fbd0

    SHA512

    b9be84461552a13f33eca9375d6f7f5a93ccd463ae177fd487753774c276175f4e738dd3fcb2d7f5f349d2f0aa1273e6e2abf1d4bc754e6234064a42172b5109

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe

    Filesize

    2.6MB

    MD5

    efe9b5a6f01418496838d2f5017a0a10

    SHA1

    4e19c551c8cf47371210132f32e2d7c16285156c

    SHA256

    782e7f3e3f3a294efbbd0fdfc043b1b060c3fae059f19dcc90bc8e8a9a93f6b3

    SHA512

    c581d87af711abd65566278673e6becb305b0d99aa39423ac2947c8ab37b8c66c4a8543c6c107e41b440ee57905d4f101865419a2efcea3aca0f421e159a0e99

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.