Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
8004fb5e66723789dd4dee753a6ee160
-
SHA1
5b0960a11ee60d02465b1d4e5402f6594b569496
-
SHA256
0b6e60419ad514ad8c3067f18c9d5bc16454d009717197a74e964605a023ba83
-
SHA512
c574fd3ec7eca5fec2de2f2dd1ae20d0fb7ba69710fc270ab5cdcf9b6a48450d73db147026c11d4f49243fcf91c8e4f3b443cf0d460a0f1e17f77c259b971fa3
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpR4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmO5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1400 xdobsys.exe -
Loads dropped DLL 1 IoCs
pid Process 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeXU\\xdobsys.exe" 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidHV\\bodxsys.exe" 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 1400 xdobsys.exe 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1400 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 28 PID 1200 wrote to memory of 1400 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 28 PID 1200 wrote to memory of 1400 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 28 PID 1200 wrote to memory of 1400 1200 8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8004fb5e66723789dd4dee753a6ee160_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\AdobeXU\xdobsys.exeC:\AdobeXU\xdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD50e4d7e8210e7eea54e37b53c4308be68
SHA13c40a1bbe85466f0e4f8f9e46ed0feb3a41a7efe
SHA256464d00ebad06a86d3d7e79555e724c927402a6330cbef036ea9959f677efdb8d
SHA51292dcdc042b1bececc55bbaa98881748bf60625ee002ff8006ed52d145c088b7060088e31a132a90e22c664792753b1f74646cc2f2067c7aa2540da05c4824db3
-
Filesize
4.1MB
MD50bd72beaa0c01aea1e2197d972e5b37f
SHA1511a7a037af8b0b10c920c983cdb06a9d57153dc
SHA256ce120681d38856e8bb9ed3e3754d460023af6f9b6cdc3bc0e0858e8783a5bee9
SHA512b76b2d929fc47c7b35acbea76d35a9ede1a872bf4210aff357eea5dd8563171711018e491dda57322ef876fe0fe96fe31a2d0e8815ddee4d6b03f90230852eb0
-
Filesize
4.1MB
MD5146c8575b9db8a91bf53d6f7474e971e
SHA169e68dd24cb4fccc0e21d0a1802b3a9a98c406f7
SHA256e0491091350f53b4bee58563722e0025c3c071bd108cc8fefcace429eab78ad7
SHA512621e3f2b8444aaa044cf1604538b1a67ba5ec90bb5047473eaa77b7845403c41e7403cef2aca237bfe95102ec96c13bc9d9226d23590e7bfdc76697381798ad8