Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
15719c925ed1b22cff03d527fbe6a710
-
SHA1
2f86705150032ec1ff2b5c0555ea9407cbb08d55
-
SHA256
5422f8458af2ed11979faaf7350721ebf7522cd079ac481ac32d4b863ff56a3b
-
SHA512
9851318946a1f8387644df437b4ad683314d205c11117a0cd7ee21fb9fb7d5b2ff696a4d2521027ec24dac3c9c2251ed72d15ac12997285ee18740aa648662b1
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBG9w4Sx:+R0pI/IQlUoMPdmpSpM4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3684 devoptiloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv0T\\devoptiloc.exe" 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintAG\\dobaloc.exe" 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 3684 devoptiloc.exe 3684 devoptiloc.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 932 wrote to memory of 3684 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 91 PID 932 wrote to memory of 3684 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 91 PID 932 wrote to memory of 3684 932 15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\15719c925ed1b22cff03d527fbe6a710_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\SysDrv0T\devoptiloc.exeC:\SysDrv0T\devoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5fcfa832b25ff383021c888c425488ce7
SHA18d1b3766072271f0de31686b3864b52aa50ae484
SHA256196c9e25c02d61bd167fc26b527517de9cb21fcd8d14a2806b6723f2ff4f98b1
SHA512ff721c7ee424a9fb7fe9dbcec7333cd0a6901429eeb1bf8fea419999cb1699790e413a44ee709f10738f79adef07d71bfb770c87effa2c4e48f23fc81cf401f9
-
Filesize
2.7MB
MD5419f821a3bd0ced903d7f082cd9dd994
SHA15332a9860bc783708856de6dba508e28975fbc54
SHA2566dd1cffa8bb7a62abb271302b66885bbb639722df7817f23f9172e11b3bdc432
SHA51298ae04f1ee3302b8e95be5fe4e5caaa43c68ababdb922287d491f477c8efefd101db1b41e2701ede61b2a3daf779835c04667e78d42cf825e2a5f2f87140c6d4
-
Filesize
204B
MD53198bc34f43c72a610873bf6bb3f30c8
SHA111bd473ac13877d23229a01e998778b4a96e10b5
SHA2561139ddef2e3394dc6b4228c8d0aff795f2dbde7cdca82fa3470507bb1bc258a8
SHA51263da45cc8e252cfb78bb296a4bbec3d857225927f0c3d03c4fa76f1a0f0a31df9c8e9b858fd242cb8dd79a8882f16bf16968684c67290cd6d6a48dce46a112fa