Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
0dc5d6e66d99d3360d8bd0baf50bc8e0
-
SHA1
92de0729f05279b9b67776fbf37ca0a605c217fb
-
SHA256
2a8850f3f16ec611d68d80d8d677d9cb23e7eecd08ff6006a0f98445f49cd8e6
-
SHA512
fa0528c4173ca158031d84e5990b29fcc541e2af3d6dae4fe15056c579d21d5741c6237ba53b65df152c533adb43bc2d1cae5f52c607c550eef344b368d791c6
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBR9w4Sx:+R0pI/IQlUoMPdmpSpF4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1964 xdobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesU4\\xdobloc.exe" 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBUR\\dobasys.exe" 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 1964 xdobloc.exe 1964 xdobloc.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1964 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 88 PID 2348 wrote to memory of 1964 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 88 PID 2348 wrote to memory of 1964 2348 0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0dc5d6e66d99d3360d8bd0baf50bc8e0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\FilesU4\xdobloc.exeC:\FilesU4\xdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d38e5e7d1f35179ab96ed7022c8a2bd7
SHA1a8a81368eddb8dc704d14bc94fcf42c9ac6827d8
SHA2568c8b2fa5a9138a8f5808329da80dc03a09358610c16dfefeff64dfae22757357
SHA51254ab181f473d2c5078ba0367a8037e0ffd0e2327947e6e0ea0eec9765f68b2a38bbe29d91f7a38d524ea4dd3e6bd8a06584933aa05d2640ecc262273ea33a4af
-
Filesize
2.7MB
MD553a599e5688849f5be43c31771df3ef2
SHA1cbb88a6cadbd52fec73e32e34e4d4d4667684498
SHA256ccbd5284d4cb9c188fd24b4d82b439a58abfd97d14141042f6c3cedb8abe6fed
SHA5129c785c1de2a3d98a053f9a5edf2c3e533015fbbf0947c294ff466fc27762389a878d26d18024f89070e37ac9a104d6da76a4d618c70174358e53138295542167
-
Filesize
200B
MD53637f6ebcff6d0fe767728ce14b2b9bd
SHA12cdefc7aec51a0285c64fba94a30e81ed8fae273
SHA256f4b5a5e7c564e48d749a3ce0a770c0f446c31efdddddc88a59fe1d9eb6208b6d
SHA512aee1a27281625385f9d2a9ec32a9a8b963afb90bd1fc26546072397f751e06e5489a0566e1a926b90efc283c513bcd973e3d4432f25adb79929e91075e71be84