Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
30ff215da9c612bb7634dc055780c960
-
SHA1
a60f20058314531bab7102f6b826eb65e62f2a03
-
SHA256
8ad57c37b0619a71fc3306f7ff00c7c528180737df8b30ad9b8edd7cb37730de
-
SHA512
7d1429ceaa6e4b5c2686ec581020c5b9d128a379001fadd01446069fed256e4717f312fca63ea9cfb11b254a0cedb0a374cf31fc036b80b504fc4528c699bf7c
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBYB/bSqz8:sxX7QnxrloE5dpUp7bVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 2064 sysadob.exe 2512 abodsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv6F\\abodsys.exe" 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB9V\\bodasys.exe" 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe 2064 sysadob.exe 2512 abodsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2064 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 28 PID 2932 wrote to memory of 2064 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 28 PID 2932 wrote to memory of 2064 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 28 PID 2932 wrote to memory of 2064 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 28 PID 2932 wrote to memory of 2512 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 29 PID 2932 wrote to memory of 2512 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 29 PID 2932 wrote to memory of 2512 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 29 PID 2932 wrote to memory of 2512 2932 30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\30ff215da9c612bb7634dc055780c960_NeikiAnalytics.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\SysDrv6F\abodsys.exeC:\SysDrv6F\abodsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5e8547a11cc50020bc1a7c3da41e3deaf
SHA162dffd31f6dd5cf81dc7d7592535d2dbfa25c054
SHA25635dc2ca597c9ed23b58ca3d7e4e1a5d4d6a4d6387a23c56e7297aa051565ce8c
SHA51281e895f7be00da01ccc4f7494cfcae66af4a75664a2db90c8f7fb40d47f5a745f066b898346e8735d12784395cd8eb5a1645004c82c01b78e5635dc0ae165c3b
-
Filesize
3.6MB
MD54d913a81696d29a58236119341323c22
SHA1a3a7dc3331ce437f335c371071a283d54add3038
SHA256f35cfe9c6fedc7db03cc18444cf06dabd108ee363d61ea3afc6cac2c2eabad0b
SHA512416035eed13ba0f404cbfa77a9af002f28ff5b3d23dce7561d6c93b700bbdd7d54bc6936dc86c1ae1bcf76e8e1fdc0e80d2367c3849bda03f8353d9022c51fad
-
Filesize
3.6MB
MD5818da5ff4f539248ce1b3c71338eb7c8
SHA1df7f0cb96998cce5fb583b741599160adb5388a8
SHA256ebf907ae6b7676a6fa5e64ec43fde664657fa3ebdcf4c86c7391ad038559a8d7
SHA5122750f00bff671246c21b45a8e993dd229f3b8bd0a2390bb815c7c76b36f332cafaf7aa995b8b9f951a8068fcdcbe3f5e84c742b682e8638e7c762049e78efaff
-
Filesize
169B
MD5aa67f087e6cf122d0dfdc3bd39bd8a1c
SHA1b86ee19361d87fd110bdd91632476653ac1f0a6e
SHA256dcdbb726d7d788cde1c1427d5f2c5501ad0bb068091c0084df76c975f556b4fd
SHA512a1a21271cd17a27e3f1b837e9035a84b62776a632082623d48eb1f0c72f5dbd888f8a0a4d5396c089d47ffc6e53065207c355432334cb516cffe85c7bcaa8276
-
Filesize
201B
MD583887a63abd419cb90ef75db0e966197
SHA1ba47856033722e4e0703c70327d690dad3f01762
SHA25631de970c1d3294cb6fa792df5bb40649cb80c0e27755d042ebf7132d2c6bba8b
SHA512d1a6c25f3d8a0fd15c56dd42996d39bc588c46ae6e80175535b9b68890ad22136eb0e7f03eb9fd08bc1e1de77de435c8970d77cefd0a4b3d6104b49107ee97e7
-
Filesize
3.6MB
MD589fae8e3065341b2944fa8016c5651c7
SHA18b835f187398780190f977bf180fbd6da5464395
SHA2561004c581d2e8c8e55f3f03abda0aea7e50090f33a820d29cbe1707538275db78
SHA5127807e0f26b4a71c0cd1c36db30a695b6e69e9c13273dbe3cfbd5795b783ac7fe6a85720ce74f0586954ee12abd93cbcd92f3886baf4fa38f110ef9d368198b13