Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
1f3d8dbdacef0182fb7cf9fabc164e50
-
SHA1
53f19b7d4f52c2cc64243c1ecdf4d6d16ed90f33
-
SHA256
15c71ee914a25dc06ef41f6f79186a4252b2c678d6b12390a09e868a86d19733
-
SHA512
62dba28f9183f2d4c1d6950cf2fdacf22e8c9e622d4bfac8a05bd4871f6096fa90762da1627352013c7707be64d5a6aa26d77b25dc65d198ddc3f634460ada86
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpz4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmc5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 6092 devbodloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxWI\\dobaec.exe" 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocCH\\devbodloc.exe" 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 6092 devbodloc.exe 6092 devbodloc.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4676 wrote to memory of 6092 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 87 PID 4676 wrote to memory of 6092 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 87 PID 4676 wrote to memory of 6092 4676 1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1f3d8dbdacef0182fb7cf9fabc164e50_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\IntelprocCH\devbodloc.exeC:\IntelprocCH\devbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:6092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5d5a7d525dbe308b8a427c14d39f93449
SHA1be921176bd559fb31ca16ffa3f7b1138564947f3
SHA2568989c30319b39766d8386754527ee98423aa21136d1918453163df7dc04c58fa
SHA51287796e55cee373ea3be465a18afcec7543ea327cc6f5a289619a90950d3b9b16cf510f7ec55871ee8f7a27fc7bcc672ae59cb2a6862aadb1004c706de3925521
-
Filesize
4.1MB
MD5b8ed737d1127388ce0f786a502fc0df2
SHA1f4310ce26f70ab3fe4c0259c75ca4e33275d13d2
SHA2566ac03a453dc89a695f55623be0ed9a8a8979f5ee4e9ffb8ef80ad2eb116a8823
SHA512d09a188a4dab4646f093c67dbd7aa7caf8a9dbfd0c275e7344b91d5212ac0946dc854559fb8a6167f293ef606fbdf621ad11d1b2402ba202a9eb1a64b755d7c5
-
Filesize
205B
MD59291ff3b7113e65aa3137c46746b89f2
SHA1db616e8317f7feccd2fced15683e42b1ad2426ef
SHA2561bbcb3f3d8d6afe8caaa500723900ab2b32f7294f82f47bb70a6d13b6efa3529
SHA512155b3d589b520a666f9d55114331aaa7dfa6d974a6155a68a2f09600af121b0332265f34c3d0f9758a38a1dbe24ed89575b3a044ecbb30722190cb8b797eaf7c