Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 08:07

General

  • Target

    c48f64491a7a7b87bf124877a63ed240_NeikiAnalytics.exe

  • Size

    2.6MB

  • MD5

    c48f64491a7a7b87bf124877a63ed240

  • SHA1

    85aed40db6aaaf296c2be48290ccf135276a3ac5

  • SHA256

    10f1c6d91af5d7115b3a4778c641a4473fde255b6d0517b30d09f6d82cfb2eae

  • SHA512

    eb7f5c4e3f1124dbdade029e9d70f9a100c1d00a7fa29427377df41a574a7ea01dd28a5215e122741062aea60b22edcb80e4312c018a252f39826e2c8616a089

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBcB/bS:sxX7QnxrloE5dpUpDb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c48f64491a7a7b87bf124877a63ed240_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c48f64491a7a7b87bf124877a63ed240_NeikiAnalytics.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2516
    • C:\SysDrv83\devdobloc.exe
      C:\SysDrv83\devdobloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZQE\optialoc.exe

    Filesize

    2.6MB

    MD5

    a5885f5e22ad1ccd091f42f38de7ba6e

    SHA1

    65b89f92c3397066fb83d7610be120cdb1647ddc

    SHA256

    7658a0623334c38ddcd316609875f03852c1f221c895467245c54c8e99447501

    SHA512

    67c0fc6036e59559a0eafedca22d0771937115b658a12fde6900b86731f529116994428f1db3950d3534d8f821d346fbd0494297d64007a0538409d9ad54cec0

  • C:\LabZQE\optialoc.exe

    Filesize

    75KB

    MD5

    ffdfa29fb667e32a6bf13191dc52e515

    SHA1

    98206372c29abb56e82d8a30bdf520474baf8d9e

    SHA256

    2bc238da3a40addac6cbda2995d3017b718c47c9e1a0c82d2f59cb5fe6a98118

    SHA512

    df60150d6555efe7bd0f236967007c449d11316bdde0c4da876b93cfb951f0fb829f5b8d2f6c1d583c9d3fff158376061f4ba44a9fd9be83518deb41ce467c5d

  • C:\SysDrv83\devdobloc.exe

    Filesize

    2.6MB

    MD5

    2ddbd5d20c5bc6de30e94b654732d405

    SHA1

    7c011b9f6ecb8fa26caf0d4c77568045b19e3a51

    SHA256

    cd1500125512ce478408e74f23013e5918d4dbba071e83c03492de0b1a5df53c

    SHA512

    30427f3a890ec53dc78e0738148f4a842c684d2bbfe3a79a8826653880927b0f72c042585e8bc59cb8a02ab077b16f7f7c5b2d93c9bd8d3072c0f290a145ebf2

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    173B

    MD5

    717b903d2de6e7a956b397f5cd576312

    SHA1

    d149daee82e2bd735887279e1cffebb2a1d3a108

    SHA256

    c204df167f92fcd85993cfb0102e65de19090d44bf8f4c811ca60f58df33261b

    SHA512

    cbcff9f3b2ecaeca6c1e2417e972efa1858b4a35866469608a890b60e0f2e9dac6438dbf25fc16cc6ee1fce8d0e8ec0022675b83ffa73c2f669a623f8d43622e

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    205B

    MD5

    140be81d9638ea909afbb4bafa808ca4

    SHA1

    4e244cf98c20564e9d2e25c03adad70e597f66e5

    SHA256

    a8374386246250475982febb507db69b3e25b5819309b7632ca81c9913ed920b

    SHA512

    24c28d70db64320fca2e5241f377689c86c0ddf53ff1d21c099002c0d1ad50007431ec2a2d0a316807b212598c0b36c516a044906055169d1c6d9696a1b03f91

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe

    Filesize

    2.6MB

    MD5

    d33807c52a16c826dee3c8964f4da4fb

    SHA1

    8e98c9bb95f881f77d8b6b76e7c694ef5da8fbe9

    SHA256

    0d8915324af74027398e4e3dc9babd84e3b59b211a6a51749649e67c76e72e7f

    SHA512

    b68f07c7751a9459ef8dda831081a8327e1a4a76f1f133b0d0daa21c2735d2b54b298b09e2ad1e32bfe1fbaf53ef13668369ee082ed2d2d95b0d2d478fe7526e