Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
2a4f3b68155a15dd408e3889645f5520
-
SHA1
043bdf35bdf792392cde370424158faad11f857d
-
SHA256
49435904d2f4bfc978926e4917cbc4beb42d41fb45903795e59cebf6a4ac36df
-
SHA512
05cd9981023e34b430d11671952e5285ef00d19b2016f217f2887083d7a5f3d39078028c06fe8b448d079c32aa94bf39e42a6dd05895172cc5f9fdc3d6f35058
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBL9w4Sx:+R0pI/IQlUoMPdmpSpP4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 xdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc7B\\xdobloc.exe" 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidZ1\\bodasys.exe" 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 2584 xdobloc.exe 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2584 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 28 PID 2400 wrote to memory of 2584 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 28 PID 2400 wrote to memory of 2584 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 28 PID 2400 wrote to memory of 2584 2400 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Intelproc7B\xdobloc.exeC:\Intelproc7B\xdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD5cd749814195eaaf90d7bd6a2744ecd50
SHA1192f2bcb6affc7ee49954993b408a0c96be1db11
SHA256662345c162e59ee07f1f52029a2d2619e9e6fe44a211c1ce3ff318ea9eba7f9a
SHA512d20add773e17d96571155b7d1b16a3f1510ca70457fe47782930a05fefadf687c4367254903088b56eccc6d03d1eed466588e00a4150f868d76563704a57400a
-
Filesize
2.7MB
MD5a18c37bf1d0d0d07c4d282bd9e2889a3
SHA1b17bc3b9042ca56450012e7152cc19f2e1126ddc
SHA2568dd2f10a21e953fb542e301c6430565e9af8a4917fa0b00d0276cf115dced524
SHA512b14c7eb1583f6214b21397ec835584fe3d75c9302ae4ee772007a07c1eb5af8dcecf87d83780ccec9421925d3841b8392b29adb88c9d268f4e61372da8fbe538
-
Filesize
2.7MB
MD5b7da3b3d9ef136831c68e1b6d132355b
SHA1ab968553f123b6aa9900a6aa69179637bacc24e5
SHA256e2179d0c56b0fb04fea6af437e6708540ad7550aba26858ab6259e00f80c1ace
SHA512cd4c356107a977c66a688151492a49bf1024478f782a4316f5cb45e5522d2038801060f9d0deca5181ebdf82cd8658d403584a8fe8caa4b8d723aa9708b81563