Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
33a9720f65196caf040dd104bd9a34d0
-
SHA1
26b48cc87165d484ee711491b9fb06ee2d9d65bc
-
SHA256
04a10784b3027a3ba0fb91b386a9d4258651b19dee8cf425588c5d25230b219c
-
SHA512
9154ca396a05731c7fd08a49e04c9efd64647e5f7702557a14e74e3139494180458305cf0180f57b1da97732252c063d826eea3438d84f95a803ba8663df1783
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB4B/bSqz8:sxX7QnxrloE5dpUpHbVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 4020 locxopti.exe 4860 aoptisys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotVX\\aoptisys.exe" 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintU5\\optiaec.exe" 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe 4020 locxopti.exe 4020 locxopti.exe 4860 aoptisys.exe 4860 aoptisys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 880 wrote to memory of 4020 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 87 PID 880 wrote to memory of 4020 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 87 PID 880 wrote to memory of 4020 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 87 PID 880 wrote to memory of 4860 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 91 PID 880 wrote to memory of 4860 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 91 PID 880 wrote to memory of 4860 880 33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\33a9720f65196caf040dd104bd9a34d0_NeikiAnalytics.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\UserDotVX\aoptisys.exeC:\UserDotVX\aoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD55456bee178a101fbb8623a9740c2c603
SHA1d5ebe36bc71cf5ad85c625afda0d1ce3aaf6f103
SHA2563556b85d98792bb1fed9e7f1a08f584d21357e940a6cbea14676b58d89ede8f9
SHA512ce905a9cc4c57665dafa431e72919bacf118aeec076163d7827f57cdfe17693fe00ca0eb9613368bd05a6b01efa0e37cf7ac3b9eef9df1806d2d6bdc05f32d0c
-
Filesize
3.6MB
MD56aec26370e48ea057268d658974d2dcd
SHA1d564d565444573729135950c9653f613a1ce50d6
SHA2569e4ebdbfbc9bf71b78b421b22c8b813adfbdb4b353e817e24ac59c533e7f04b3
SHA51214982a8358c39dfc679090c5a3912daf3d2b5c0a57b5107d7b5227fbb9ca557f887f2e9adc0a2309c20f17d0b05c8d3619ee1bf43b177ea321643be603ffe8c9
-
Filesize
3.6MB
MD59ca0e8582b9970edb00cd1c6d730adb4
SHA1ce1942589a01e210f85ce65f81069b860e08befd
SHA256c37f1784c1c25b23298c6cbbb13ea4aa36a57498a733f335f4a5dcda38c01342
SHA512a9fb177f62ba04dcff4119467da4f0092d079647c521406736e3fad4b8dc33517a76f1e010f46c2aec9c9c67ba73fba18a7ed52f2acd94089bb1887c2df90c01
-
Filesize
204B
MD5bc4d5161bb6eab42301cdde7000c0579
SHA1b708d4639e9315b1c1be18f08169c3067e9baded
SHA2568a40ad7a3286674e475b0a4df11be02bfd87626f40b2144ce2c8772429e5fef9
SHA5120df197dd179005219fe4ce388d275ada965d1346b014c16927851fc02e59609d019b3d71e924f9c4527b0addf052a6bf494b45c5b6140b329c89eefa9781efa7
-
Filesize
172B
MD5124ddf3a796d54908fd718615d60e821
SHA1326011ba97931c0bf37bb8220abe824cede4f22a
SHA2569bb07ebe42195cdebbc1937d019df4c75fef76a7d4573bb81df95620ddaf1487
SHA512c7ecd4bafe4ebd924bd7c81b7456eb6d3c32805c25d3304392f152510492f1edca215422f8574b84d504e4c8b5d392566d950e5ffb4fdc95e3bd411978c74406
-
Filesize
3.6MB
MD563a1824c36da3ae36a2439bc1c3cf043
SHA13210090b03c0292c41f86619b8cda1122413d196
SHA25615dd9081997b48f28a78c4beef8ff4d8e0f775610611a12836dda9953812d36a
SHA512f6c0cf49dc70e7ec3dd87273f3aac59e446d9e0fb22a51946952f0bbd0a4601f6ec092d2f1d6fc1ac82e6cfb67384afb71f5d58991d0980532562df013f9cb8c