Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
7c2e2db9209ad16b89269d6ec8aec320
-
SHA1
0506161bbbecf8d4acd643236132ba3630368b96
-
SHA256
0b2f0869b54d9ea62351f035540a7a612fe680ee9e8d82b4ae2fe5af88cfa344
-
SHA512
4b75b79452af3797c24d5a9b7f9ed9395dcb8e9e765206f9b27303ef3a5405442e25f4f02d45f1a4ebf8a403908e6576b8ab8155ac9ae82ab37e5e0aa85da885
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpG4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmJ5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1268 abodec.exe -
Loads dropped DLL 1 IoCs
pid Process 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBOG\\bodaec.exe" 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files72\\abodec.exe" 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 1268 abodec.exe 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 1268 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 28 PID 3000 wrote to memory of 1268 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 28 PID 3000 wrote to memory of 1268 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 28 PID 3000 wrote to memory of 1268 3000 7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7c2e2db9209ad16b89269d6ec8aec320_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Files72\abodec.exeC:\Files72\abodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5e0503a33309a201c1094951e6c9ce2f6
SHA1a7cfd2c6a9387c2aa56dc1b8654e42da73ae4d99
SHA2563ab121d54f0bfa84f6f652da1a40537ba249d5e6f89a836e3467cbe37a323688
SHA51285c02c78d9ae10a38aa0927c8cb4fb2d459fb726090522d69393b49c9d8376bf682f54169d9fc90a8c63a389803de16d01906f482fe8dd7820120b5dd902bb7a
-
Filesize
200B
MD59c034602c25c8431031bee0ae160f8ff
SHA1759c324312565911ef74059b2b66a9668a1d1405
SHA256600b0c7130942fadfc156d4e70b7d9dca138c00eefea4fb2e6de733f07f02bfe
SHA5124be7720bc00dd2db3caa60a2cd27c2802a47ce70af3a5ff19c812620988dceeec811ef75cb16e4d28045ca33341cadfa042d9b24545f0791045e80b3096cc9b6
-
Filesize
4.1MB
MD5a70995571397f49fe312eaae6323c731
SHA11c861df348e145aa44f5855ca340bce8e4f66894
SHA25602be7cc49567f6f2496d62a399103fc704f807088c126b297629d6ad6ca2379c
SHA51239c989c1c135711ad4699590beb2584b9ecb5edd7a025389fa7e91b547bf00a38df58700ca633b5ffc19699c4bb36bd8ebb9984191e642195c4c6d93304f2070