Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 13:32 UTC

General

  • Target

    5aaaffdc4bc4802ab0bcec9a62d63930_NeikiAnalytics.exe

  • Size

    4.1MB

  • MD5

    5aaaffdc4bc4802ab0bcec9a62d63930

  • SHA1

    2176930b0802f756ab7193e3c509f9e302f026ca

  • SHA256

    0be71902d15a12bb0f21ab325ab5f50c4b7935a6320a9c810064ab712142a872

  • SHA512

    5e684a05e5bdd754254af407b54e2a7a14ab769fdb9bd526c8ead612e0a59830eb3bb411ad7f93a543e796ca0443e48242954e25917c0fc0abcbeaaec6b094bc

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBEB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp/bVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5aaaffdc4bc4802ab0bcec9a62d63930_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5aaaffdc4bc4802ab0bcec9a62d63930_NeikiAnalytics.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2240
    • C:\UserDotDT\xoptisys.exe
      C:\UserDotDT\xoptisys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\KaVBQQ\dobaloc.exe

    Filesize

    4.1MB

    MD5

    94dfa680d1110c1878b44300c924a6d8

    SHA1

    ff879088a17f609d9d880cfa3ff1aef790cdc394

    SHA256

    b51e6fa4646cfbd75fb398821642b6dc3fd678bc9f2a11f27cbfc65316d5103e

    SHA512

    9678afeb1a9bccd67ee373260f80d84fa459d8e29394d40cc52dadec2375c46459e6bf52fdbf1c33e497d5c575cb08718918a5ee1f9dd6e294119c61295958b5

  • C:\UserDotDT\xoptisys.exe

    Filesize

    4.1MB

    MD5

    3c4fe9bc9e100f62f6fa4ace6b7df7de

    SHA1

    17199ebf4161ca524747cb51bf455b8bd0182dda

    SHA256

    dd5c7b68f244bc81391da14664860e39edd06eca0beb7ef7f093d2b83744f148

    SHA512

    7f8fb6629fa844b8a425e069572591e08d3fbf39b481909a738750f0d8b5ce48f36b65aae476cdd532d14e40dae6af647b20f6a57aed94dc7c9b93456cd4eb21

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    170B

    MD5

    8456938cb093d7e56432b74f52f521dd

    SHA1

    b4b67221aef0fb08c5ac81545906f51e04533589

    SHA256

    62357e25ce63ea78a9fe47362235c9f028c4483b029d6a11c79624f2de40e8bf

    SHA512

    8b7ecec1ff7e67e5c5ce79f2fd7766ccd3798676a130fd2355073b55839b0750239dcf83aecbe6909ef5181103c4576f91c97630acc235c0a6d7983f9e7fc311

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    0ab0138860c11670e5a3bd4b88994884

    SHA1

    53135aa390cc029671df6b32c4983c409e392527

    SHA256

    395d295c584948fca23b6b786dc2da28cc7ed7df90553d12ef8fcd3f66fa91bb

    SHA512

    c0021d6ccfa7a26317b322c4ee78a5a80e895573c053299c32f8fc75da68bd952c81b6abb5487d16caa18bc384e4d12a7a1abe17f4994fa49f7fbf7aa3f2a304

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe

    Filesize

    4.1MB

    MD5

    6262f03f5a3a93a62b260a056db22a70

    SHA1

    7ecddbba0b78be9731f524a96c8f95e6441119ce

    SHA256

    74666e8f5befe2e7e34978b8571797dbf8ea1379669afc33aec2cb31bd14fef8

    SHA512

    0d58b4024fd121e0c55b0c16f53c3c054db5419064d6c3d25ad00e29eb05316a7b9c8408f750a3f8229950b847a2b5a4eddd3a249e7499774d9a05d72e5af99e

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.