Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
231feec23bee69ca907eee006c410a10
-
SHA1
d31baf06e944e455ffb311e8200721621ec11dad
-
SHA256
2e28e8a244430d0dc9fc788a405bf044a4a6fd8ebefcf6ba9c78bd15e1001fcf
-
SHA512
9b182b1fbe428a6806418071b913d83469ef3f978eef19f1f765a30e04bfa88312e5a17ba703d932e4bc19bc65ce053778e3917549b68ff4d625cfef54d9abf1
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBeB/bSqz8:sxX7QnxrloE5dpUp1bVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 3672 locadob.exe 4728 devdobec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocN4\\devdobec.exe" 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintBU\\dobxsys.exe" 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe 3672 locadob.exe 3672 locadob.exe 4728 devdobec.exe 4728 devdobec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4436 wrote to memory of 3672 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 86 PID 4436 wrote to memory of 3672 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 86 PID 4436 wrote to memory of 3672 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 86 PID 4436 wrote to memory of 4728 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 87 PID 4436 wrote to memory of 4728 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 87 PID 4436 wrote to memory of 4728 4436 231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\IntelprocN4\devdobec.exeC:\IntelprocN4\devdobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD554b9229a5f03e6508301a367fb5382b0
SHA1ffa9d2c4d974b61eb8659540142c235388106e66
SHA2560773464dcf904d504eadd607f7d448beff2f4e9be3062a0a74c68fc1b49dc394
SHA512197f86c090f5ffee556d45b8db4d3033ef62987c1a893783d1ca78260177c49b6bca7908c74e892636bcfea33b25877e9062a0d1616d3aaf46a1384a11b04bfc
-
Filesize
1.8MB
MD5900a6c5d862aa0ca30a362086982802b
SHA104f57220447169dab5f7a9a504314a6809b43e8c
SHA2561f5012a4b6995836b76d30921198aece344b919222fd2a9c345ef2d8d1927200
SHA512682090b55682557a9b70abd745bda16f91916adb06537ec65b84c0256e803f0727090583200217ce0b4aff401cd45e03494952e653a9b3897efcc5798448bcce
-
Filesize
3.6MB
MD57bb7541600b73143eceac69b718339dc
SHA15e9cbe96cd6e11bdc6494ab5b9b18217fef8a9ce
SHA256cd5c42bdbf1a1cc9e6d7c464661b274d658f98d10a71de6b3e778aa2808fcebf
SHA512c886696296b5002ba049f88b6f71d8bcb02331b1c77382b1e69c3cd207988a5dde7696a6463175b8795bcfd93556d8392079e4c4d86c5cb9cfd5ebebfb218d78
-
Filesize
205B
MD5d561b8f25a5ec0e6145179ed165a7b0a
SHA1a3a3d33eae192f281f2b59a37a5d87fa8eb14a30
SHA256475d42901e569233a2c3e0204d46753f989717493d87f2ef22ba964cad36b3a5
SHA512ffd7bfed3a0b2a91e41437095e3fa9748f3f155a2ca1d9498913f83076f727e257ffcecadf589e8126b26f3d298163b8db359547ab2d54f1cfa3c1ccd411a601
-
Filesize
173B
MD5fad1bf64fabc5717ba4cc4965e1e72d0
SHA195575a10464b66736604ae3f4a5ace7ec79f911a
SHA256f611a78dd1f95ba2cd5ee41e23e8ccd3aaf36b4b59638241b387129ea15bb106
SHA51215b1639fd472bc5b63c2b0c56c42a0acc94f4efbafd83e4c0148b1b782d590a1d7292ace4e714f7ba2c4b818e0b00a33fea665dd0b4f1e7cb0bb5bb5986156a1
-
Filesize
3.6MB
MD5cc2f99c01a8a5a15cd8dfafee50e004b
SHA150e4cdb8d81bcc91062c7f8d7e9a6cd42ccd4fb9
SHA2567bd1b99a8e4e2e297b357bff07816283a23a557b0016b24a68886e814fd6d99b
SHA512bac8a6c20abedf3962ef9ecd51418df3203f6ead835a729b4a7cf56221f4bede446cdabde3925ba58135b863f21b233c1761faea83815d0af5b8bc17a5fa852f