Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe
-
Size
3.0MB
-
MD5
2aae35b1b8481eec3256b642ef6fc180
-
SHA1
14259d5ce0edafa907e2deac16ecdc954ca17dfc
-
SHA256
f932706daa89e5ff3cb5d2a3fa1ae5c1b9c9aa08af6161cd28bf59a82577d1af
-
SHA512
01c6cf364ee531674866a99e490eb3b06e627b93587ca82b79cfa47ea27635f3ff355e3777f0a4bc19fe147ceb6108eede23876677b296b6dc8a7b983206d07b
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBHB/bSqz8b6LNX:sxX7QnxrloE5dpUpQbVz8eLF
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 2296 ecxopti.exe 2792 xdobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesL3\\xdobsys.exe" 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBYY\\optidevloc.exe" 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe 2296 ecxopti.exe 2792 xdobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2296 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 28 PID 2864 wrote to memory of 2296 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 28 PID 2864 wrote to memory of 2296 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 28 PID 2864 wrote to memory of 2296 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 28 PID 2864 wrote to memory of 2792 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 29 PID 2864 wrote to memory of 2792 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 29 PID 2864 wrote to memory of 2792 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 29 PID 2864 wrote to memory of 2792 2864 2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2aae35b1b8481eec3256b642ef6fc180_NeikiAnalytics.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\FilesL3\xdobsys.exeC:\FilesL3\xdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5f288bc9836c2ec422f484841fc7e9dde
SHA11f92e3d64f191b7eb5771c1557e1e9a7c93cc305
SHA256a2a21f33fe6f896ca55120ff94ca91dc5b86f2adbade65d727bc7e2e57363da6
SHA5126705c8473719e3c8d1175cbef5e047c7de9bbed4a937bf8147be8d87df7d2630867ca1b5b80745515058848d13e359bf65bf597bdb23771785b181ea45e63784
-
Filesize
3.0MB
MD5e52d9b6c42aff856477c19bb5e806c53
SHA1c1d9c0601c0d5fbdec7f4629f2bd902ae0e3e0f7
SHA256ef78ec26d848aeed3b3d2d20011ec3de0462acae81e300e7b7ea9fdd71e5fda4
SHA512642feaead3af9496a5b5df83926464ee5ee99979fa0c3e6792944dc43b57a0271d698de5b9a9ee945b3ee585df0a999273c4b047623b6427fceec6919bccd455
-
Filesize
171B
MD524d12a81a8f11490ab90b4c57d7de648
SHA1f696c9783c1bc62ecdb06f394084696d80cec816
SHA256f3c72f4f05ec899af7c5f74b02f7097958d71850f4311067f08382bdb6f7aa9a
SHA5127cf07d5c4243ec7cea4b3e788a8cc071382cd1768bfb756a8a592684b77097136ab46f2a265b0c4e0d95fbe0825edd43eb36cbb58990341cf04ac68be25a5699
-
Filesize
203B
MD5f006ca6093de13bc8c90fb41a1e9057e
SHA11248c4a4e5f0324524d2efb876f7d82d0ace7100
SHA25672b64e93d181ae40940b35594d467adf5eb2e3e7470e440d0dd2b0a3b6947506
SHA512f979bc1ba84d144f1724d7124a07e7a6e41705e00a4545e3247abbb604e808f3bf5f2566baf30138ca9931c3d44a7f805ea0df376a09564d37e898cb932153aa
-
Filesize
3.0MB
MD587f84b0ba6f1591e98160d31b18ffead
SHA1c234724fc1fc5657706f5474a124e2f6f66e87b8
SHA25681833af8728c674564c2e10c8d329b41e2891d0255e92babc769a15717f9855a
SHA51207c9d3ef8a0036665333504e40ae5fd92916e2c716f865d81dc33b57367e0a9599c96d25dd5990c692a15c19359d31491be4da2a20bf919a181b4a60781f44b3