Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 19:36
Behavioral task
behavioral1
Sample
1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe
-
Size
722KB
-
MD5
1ebe565a53c03f4bdc495d6941df54d0
-
SHA1
548ac8deefc8d727b6fdc8aa3ee7281610c9ca93
-
SHA256
860fcff2ec1ba07bff7832f5ff0176b0e4cd99cbf42f1945d22e1450b8897f26
-
SHA512
76aa2e26f8a8c7b0b4f9e49764615050392eb6a0b43046eb84715f9c1ea60d12895acad51d43e5cccb39ee5a0c457d8d7d77f171501c5059c920c0d8f13b69e6
-
SSDEEP
12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75F:arl6kD68JmloO7TdNaPymUi63i62xHLR
Malware Config
Extracted
azorult
http://185.79.156.23/j0n0/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/1288-0-0x0000000000160000-0x00000000002F4000-memory.dmp upx behavioral2/memory/1288-23-0x0000000000160000-0x00000000002F4000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1288-23-0x0000000000160000-0x00000000002F4000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1288 set thread context of 620 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 772 timeout.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1288 wrote to memory of 620 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 83 PID 1288 wrote to memory of 620 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 83 PID 1288 wrote to memory of 620 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 83 PID 1288 wrote to memory of 620 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 83 PID 1288 wrote to memory of 620 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 83 PID 1288 wrote to memory of 1896 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 84 PID 1288 wrote to memory of 1896 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 84 PID 1288 wrote to memory of 1896 1288 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe 84 PID 1896 wrote to memory of 772 1896 cmd.exe 86 PID 1896 wrote to memory of 772 1896 cmd.exe 86 PID 1896 wrote to memory of 772 1896 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\timeout.exeTimeOut 13⤵
- Delays execution with timeout.exe
PID:772
-
-