Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
1dae5603564f4a8ff932855d3ec7f590
-
SHA1
bec7a6c89894facb806eaef85c29683c1337079e
-
SHA256
51729f590d3eb4ca7d41c1617cc507e52766ea7e0ab095a74d5f5ff69fcb25db
-
SHA512
bcb0a962e6ca8d680e7300834245105ada05ed4dbdba9344f337d8c115335aa3793b0246c0d38a6081d318e08d178de43d7d11cb8c739e7b8ec1f3c76d17b0ca
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBVB/bS:sxX7QnxrloE5dpUpGb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 2524 locxbod.exe 4140 xbodloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBNL\\optialoc.exe" 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvC0\\xbodloc.exe" 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe 2524 locxbod.exe 2524 locxbod.exe 4140 xbodloc.exe 4140 xbodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2524 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 84 PID 4780 wrote to memory of 2524 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 84 PID 4780 wrote to memory of 2524 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 84 PID 4780 wrote to memory of 4140 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 85 PID 4780 wrote to memory of 4140 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 85 PID 4780 wrote to memory of 4140 4780 1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1dae5603564f4a8ff932855d3ec7f590_NeikiAnalytics.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\SysDrvC0\xbodloc.exeC:\SysDrvC0\xbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD512f25a7475deb27ed1c7ba2abd7760c3
SHA181432be178d9c134a354ff0cc96fa692d48bfa91
SHA256377ba83ba13124a6838b1c6d595bdedafd8d941394d202a678449a01976481e8
SHA512c2c052efac626bf81fb22548859df986096300445a29a77efd85186e8ca4b255812414c4909723ed38053f1db401ccd3a487a75ad0e9bf09a9437b0d9bba44fe
-
Filesize
5KB
MD535d5f2180b8da2eaecad0679e66dc251
SHA13e782e20becd6567750bacb04faafd148aadac06
SHA2562060beef29432b8908a388df4a1a966c34d69e51cbf1f836ab07935d52f94700
SHA51215f574e8e815c44b4444d3eb87af7e00b262eebc14f1ab886d4912aae01cf910dc7d4f769f884a3659bce05e28faa5a23be0190cf13a203cff0f3afdb951c493
-
Filesize
2.6MB
MD52e38db84fffba1386d5b1cac5d125ab5
SHA1d0d605a71116acbef5b5916b88fc7d90f810c3f1
SHA2567e33bedea8c403ef0d2c1580031db87c4014a611946458228443dd72b7f8e4ec
SHA5127fb46de505a79030865c998e059cfc6f7706a90111485c9e1739ad2acb4e6fa6ae2950d18d8c472747380d972d9ab762542c72e168beacb7829cce7f7e76856d
-
Filesize
202B
MD58b2f7fb57d4dcbd74e1e616efa26bb88
SHA177fce56e721ed238bf4d85e137ae45e2c9a70b17
SHA256f6c0ab385738d9239ddd52be97587d9c03bfb76f201e3fd825dac06a2ccb22cf
SHA512b5c6ecc65441ca5c53d7b32952957856a6afd165a5829983b5f8a61a06c64e756976af82c87b7bf7e32845c6566d728cdfc736b6f148232172cc2cf5849e1c86
-
Filesize
170B
MD56287b278eaf8450f39443cb16eb29341
SHA1a2a21095dba36e3d58551745a5e82f41b424ef05
SHA256f2c303bbf451bc2db9cfb2fa9db84517c4d0ee5b25e074e6dcc754198b36a070
SHA5129507b69a8f3a26cca5c5e631bbb665249cef5c71abffa00fc8a42c2a5213d1cfeec126023e5ac90d16eeafd590765609b064fe814940fa21ce65902c5150bb83
-
Filesize
2.6MB
MD5a31611011f00ea46176101d067735421
SHA188c84d2857c13a4f057815b99c8daaf4455f2832
SHA25660ce8cd6ad7dc88b5468bee5df6b60631593cbebc889205188f5d2ec4f1ba1c2
SHA5120df71a4bdd77304604e71c39bb35e016c0cc4078c1472dbe15002a27ed1a3933232e7a008647f925e0973502a990395762b81ab39f37592b245eab4053b6be31