Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
0106e99314c21933497668bdcf2c91c0
-
SHA1
d4ca09960f6c2f601185e757d7658fa708323160
-
SHA256
9f20bc1783c2dbf5fa12b4d86af5bdb246c2e8418ef538f921bc4ddc98ec7ddc
-
SHA512
b7f214de8487c91e9daaa315a931ba24c184dea64e200f371db1d10a26f5ea7cc5b067f198727d20bc0e6cb52d627060901ca1a5b167e482fe320514f2826a7a
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB/9w4Sx:+R0pI/IQlUoMPdmpSpn4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2868 devdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocZ2\\devdobsys.exe" 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ5H\\optidevloc.exe" 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 2868 devdobsys.exe 2868 devdobsys.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2868 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 87 PID 5068 wrote to memory of 2868 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 87 PID 5068 wrote to memory of 2868 5068 0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0106e99314c21933497668bdcf2c91c0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\IntelprocZ2\devdobsys.exeC:\IntelprocZ2\devdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5bf791f559738fc6f5f05461157e9cc48
SHA17a387f851dc4ce3fbd3dc83b70fc53957b8236f1
SHA256f48c39dd099a7361fbab8521d72f78381013380088807e17a6864c0c2c7c82be
SHA512ded161941a5fa442b5d0d855de5b47a773db365999d22ad213d04047bcc8b6828be33f08dc405e323aad295b98f756ef4da3d9c0fab01ee1a3aff9bd1d8d0996
-
Filesize
2.7MB
MD57f2634903f3f5fc71058a08ad8fec024
SHA1f0a37237df1af7b0a5343c9a07d544a45c5a3018
SHA2568079ee8f90437be9db1f29e1fcf944cbddf048b9515c4bc824f1232611f1967b
SHA512a984cc0e215d7c327fc099dc570b5f362b012d6b245d62bd46295494e786c385c4ffac9c506052797829a862dd70c3ab6a05f193d00dfd1333b621018c834741
-
Filesize
209B
MD5829dd21b115fbedc140f2cf94cd95308
SHA16b21a7200191bc969f223af9cdb17dbea660a3cb
SHA256eca3bb51828a6568761cb730688a4a3e6b5ba5ccb6d6b9e9c528ec3ee9e23196
SHA5124268d66060d0a1164ed337223bbde878cea1b705157af30599fbdd722bdd30f95513239ebb2e8b69cd318011ef92d5fe5d1f686f0561fe7ce4c4ac1e439dbc6b