Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
2a4f3b68155a15dd408e3889645f5520
-
SHA1
043bdf35bdf792392cde370424158faad11f857d
-
SHA256
49435904d2f4bfc978926e4917cbc4beb42d41fb45903795e59cebf6a4ac36df
-
SHA512
05cd9981023e34b430d11671952e5285ef00d19b2016f217f2887083d7a5f3d39078028c06fe8b448d079c32aa94bf39e42a6dd05895172cc5f9fdc3d6f35058
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBL9w4Sx:+R0pI/IQlUoMPdmpSpP4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3944 xdobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot28\\xdobloc.exe" 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidC0\\optialoc.exe" 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 3944 xdobloc.exe 3944 xdobloc.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3944 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 89 PID 1608 wrote to memory of 3944 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 89 PID 1608 wrote to memory of 3944 1608 2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2a4f3b68155a15dd408e3889645f5520_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\UserDot28\xdobloc.exeC:\UserDot28\xdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD55806548c3f12e7dc4ad6376ce9c4681f
SHA15702037cd50c18dd14de9dff5abf2cadcfc3147d
SHA256a808d868eb38145d96a436ea52e64ff17ba50c22ee830fabb7c72043b80b5122
SHA51292bd40361c4fc80c00b00c3eed0cb389c96e1c0f83022ec3a5b4ab73ef569cc0cefb84f1ad21cf1877b9ad9a438467b77c1102604d7315c2ab087b71931af930
-
Filesize
204B
MD5ff420b970c0767d3a348e541bdc2a6e9
SHA10084eee0581fb06824267f85f3af6140e47af406
SHA256c2a9f83c579ed0955148a55cd81e6fcca61a2f563cfbadc7ea9b0b4d5ebdda14
SHA51271e178d6a8e0dc983de361d46650299f06ecd585ce2074ee567ad4852b36619271678836044ecd689ff9e5d5e7dbc388d6fb0f7bd96201a21cf3a9539d64d33e
-
Filesize
772KB
MD588af1dd8fc13da7069213d4127576655
SHA1f5e47edd2c63ac8f714cdc1a753aa2175e082629
SHA2567c1f074c00eaea9400fecddf6ca4ba2fa3d5ff1219bcf96aec3ba3206ad2af59
SHA512e4c3cf95fd30ff5188fdd94a388e6452897b62d80b4c095988d97042cb53764bf8c859954dacf170f3e38f3374891629ef4fa431fc6269e6853f31b9fdb59db0
-
Filesize
2.7MB
MD5eabea191a5e21c9b238720ed984e9bc6
SHA1d640c550d34623fe06045746215054d191c1753f
SHA25699123368cdb811cd3ae33c77639097f6a72b2e7eb6249e01338606f86ca1629a
SHA512bca7d632e55b4dd7f3732b609af7570c15bf67fabffa1eeca95a1144f44b82a045533b1fb97846214960897a7164ad19509f9a22b4fb33a598e4b0366845bc19