Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
3cb4573e110703e8e0df0680f274bb20
-
SHA1
0092f2fabaf7b295a72eb27ce14b0516231cf1ea
-
SHA256
cd3a2bc027a4a9643b15aeec8aab3cd8cdf001b7302488c83a71a4306f30f551
-
SHA512
01f81d1b1d855584e339efa6f3cc49af9b6ec706214190732bdd15a2b94f82be9581cb1ee147b9839af68504e21e3a3755a76027c17bb85bd749530e601e81c7
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBO9w4Sx:+R0pI/IQlUoMPdmpSpw4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3800 devoptiec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc4O\\devoptiec.exe" 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintYQ\\bodasys.exe" 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 3800 devoptiec.exe 3800 devoptiec.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4592 wrote to memory of 3800 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 84 PID 4592 wrote to memory of 3800 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 84 PID 4592 wrote to memory of 3800 4592 3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3cb4573e110703e8e0df0680f274bb20_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Intelproc4O\devoptiec.exeC:\Intelproc4O\devoptiec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5a4668f1fe831a3663ad2e1cdc84b11a7
SHA13bb1cd9b39aac742a20350c498b7affe6b873c0b
SHA25633922216d7b8bcca85f010c67fd82c5d33bc9cda420b3edc2056e45fb40e476b
SHA512c70379d0312317f5399875005ffe27f2074efb3affc88b6555e5eb884ef104b1be2bae21eb9d2beeb9ea3c71260227423842383a028a93ff30b775e26589bfd5
-
Filesize
9KB
MD5bf965ee8f9d95b943a5ea888a522c44e
SHA169326314abf4da6764942ada42d063b44fb707c9
SHA25613c64f8ad509d213565146a5459b79218788b601d1d572943dfbacb755233c7e
SHA512c5b066aa1f9c4aa2d78f788c9be796bc4016f479bb94a04aa8acc989526f1637cb18b97eefb4cc366cf3b29b7f7860dfe7860a23ddf51ae21401c53b0004d60b
-
Filesize
2.7MB
MD5a2d7324b5fbf2d0bf31c51de92e980e8
SHA17403c2508c741854890a502fdbcd4dd9badd1398
SHA2562520a136d5f45e2cdb64542bfbe802c0e9bb4eba97ad5bfa232496da8fd7261d
SHA512cecd7720beb4eb36d82c59794390c841c2ad311c4d22a97a369dd25d56bcb2e702c384379bb6f39109384d75ac6f1930dc36745105f93fff26baad26e9c81125
-
Filesize
205B
MD581741635281a175ce364db78c964feac
SHA1ca637a624769c90e7882a45b381c89a6ad6c1370
SHA256eddb07865e103665d367208f970bc407bc13aad8fc0f567fefb270e8cb072026
SHA512b7aa6f46b2d3cb848d748fd673c53262966fcab2996847d0d4ec3a0ed9e6ce620d0059d1374be53c58af2b65ff6a4ebca67310cf2d368242a4549f4d5c691feb