Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
732204ac69a545f3d0b47310eba90b60
-
SHA1
55b47c692d6eda2e145aa4068d696775ef0968dd
-
SHA256
7ca8ddb88b521a5c2c5df7710dfddf9f730f5f0cc64fbdcb8557c850376b9aa6
-
SHA512
6f3bc6631fa17d08593f82b36fef8e66029b87f1856c3031127fa92ec697bd634ecda499d03d13e9632ccc1da8441e3d58a0e5d855c5d6bbd62a915416e954e3
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpe4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmR5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 aoptiloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintSR\\bodxsys.exe" 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvN6\\aoptiloc.exe" 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 2056 aoptiloc.exe 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2056 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 28 PID 2832 wrote to memory of 2056 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 28 PID 2832 wrote to memory of 2056 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 28 PID 2832 wrote to memory of 2056 2832 732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\732204ac69a545f3d0b47310eba90b60_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\SysDrvN6\aoptiloc.exeC:\SysDrvN6\aoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5c1daf3bfb39d65e75fceb8d91d94d7c3
SHA1105344d56188ae51c83aea14b46a57df9ac4d529
SHA25661ecf55c9d24fa954d497b71e97480b238fe3199095fd339b9ced9f81d0b9ef8
SHA5128dd2688c068d165cb1208d6caf2659bfa9796d124eefc537e17174646550c52e46c41e420de4192d908c0913a460b5f3ff99c8b099da5953ae246de45f8d48ef
-
Filesize
203B
MD518a23752dd68fc5442c15c48293a3980
SHA1a7e41b32af5c0a38422183067c82fafeb02c9d63
SHA256b840b0bd4f89e253f56a7d6a21acbec6372563b1aa9eb891577fb420ecd8bb58
SHA512d938da215876b92d59b42d7fc321c97141e2533dbf4536ec35a0ba07893f3f23d44692a25fa141ce86e8e96d2eb393b61637971296f9f5a6e4609987ee152e25
-
Filesize
4.1MB
MD55843c2a29cf775ee70122465d540c358
SHA118c93323c2520d1c0f4f9ab73d024f822fffc9d2
SHA256c0483e95f4003d4a95137003f661c627e881084a908fcbb0f9338c299c5220f2
SHA5123d6d5f12ce4b7d5c15b84c81daa66d25ad47a25c79124a70c40a0096bfcff72ec1f217a96081db908df4626f978514b1773e2159e05f62250c13d3ee6a5381d3