Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
c3b9f50eedc51619f3a360274bc8abb0
-
SHA1
b567233433a7dc85824ae51297004bb461fd78a2
-
SHA256
8c5d4ba2ebfbffd97734356e9c8bfe04c1c61ce68d7478e589cb5628bfb96f55
-
SHA512
a25a26cd10d98a910f57cfcaeafb7aa4361d21d277ac4d75ffa6276199d3cbd74f1ea4dec0acec692adf69dbaea5e10b521f5df25815bbf72c1064a2e5e693fb
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBN9w4Sx:+R0pI/IQlUoMPdmpSpl4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1548 xdobec.exe -
Loads dropped DLL 1 IoCs
pid Process 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxTA\\dobasys.exe" c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeO9\\xdobec.exe" c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 1548 xdobec.exe 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1548 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 28 PID 1504 wrote to memory of 1548 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 28 PID 1504 wrote to memory of 1548 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 28 PID 1504 wrote to memory of 1548 1504 c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c3b9f50eedc51619f3a360274bc8abb0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\AdobeO9\xdobec.exeC:\AdobeO9\xdobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD56b80c076c2287704bc237cb2028a7a45
SHA1d802b1a4310a5db2ac48dc4579e454988e497a77
SHA25602285756a05ec8ec7bc8ce3adf33a38bd30032d1274ab2bbd2c9497621d971f1
SHA51235c10e91049ccc46aa52976f1fe45d4f7492c516ff1fe4b2f4e988bdf70b987d4d5301d56f777703ef6f97deba6e293a2d41d5b0f2f6f071c42ee29c10986137
-
Filesize
200B
MD5212d92601a8f93ddfbfd2037af4d8828
SHA1ff6bff1d065a723a02779335aa819960b07f8aec
SHA256b5405b38ad61fc785a072725b5880d5f40c33a2ca828c79dd1f1ee26d7f39ac4
SHA5122709761329ed2de4c6e34b4cb596f62f718310e9f65e6d5284ae74f94d0c499b3c5e81af3ffd6a78d5d6f8b3ae60d53f2e13e50ab3bb5ae18b69a318d1d42b6c
-
Filesize
2.7MB
MD581cd56ee8678b5e58aef1fcc4f5e59da
SHA1b095ebd468be09cfa536c3ff1d73561fbff9397a
SHA2561a08286d1b35abca041187d308033d01474484c7d3a4f7f3985b9dc65fed86a5
SHA5121ae7e80bcc1bd920c0ef7e40d36ff962e690866848277dfbe10675c4ca8a288415b013c9f31868fa842847d661989633281a752a07768cfb6d028e162f66be4b