Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 11:15 UTC
Static task
static1
Behavioral task
behavioral1
Sample
35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
35a074c25de4f264070db56143a3ace0
-
SHA1
75809e40bbac5bf9ea658cc76474c0672d96d6a5
-
SHA256
df6f2fae49384160455aaa652d3af3624714eb50312f50e77ac985b10c2c92be
-
SHA512
d65a0dcf7a4bc3fb1a012db0e8f671e1803ba85678a146f5f0e51d9839aef969786dc3bdd7a2809b04051fd68749cf0a7883062b2bb69d09208ce2d91040e471
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpr4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdm85n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2800 devbodloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvRD\\devbodloc.exe" 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxC1\\dobdevec.exe" 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 2800 devbodloc.exe 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2800 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 28 PID 2148 wrote to memory of 2800 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 28 PID 2148 wrote to memory of 2800 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 28 PID 2148 wrote to memory of 2800 2148 35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\35a074c25de4f264070db56143a3ace0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\SysDrvRD\devbodloc.exeC:\SysDrvRD\devbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5d2abd53ee91e630bc5776384f87d5b16
SHA1a18341b68265cd5bfcb65e5b75c5d2567f0fd909
SHA256361efbe1c2f286a900c132f52c51fa8d3f1a877b37a6248cfc5ed75ad828d41c
SHA51281601aa85de0ef932a4b3277134a090524d678666ba1071980bddcedec7464c37f2d52c7df0fa346de9e19e8bcc67da20be301033ba8e24e2ce3e5a35da841ea
-
Filesize
205B
MD53a2e9af5e920ff3d08509195daa9f617
SHA1608f12cff1527e90e255e2d75abad9391871425d
SHA256b2ae832bec8731e371b7813254cb352f2fa3dd77962a54bce2cc465c4b06138c
SHA512841d11847923f26282fc19127ed2cd93ca81a234c4a06ce8fe3b3f0bccf36c0b97afef2d4e052bb99e6f6e5523439adfbc33b87d7aa19354d98f415bcaf5be25
-
Filesize
4.1MB
MD5b046a56e2dd2ccca55f733a155b3762b
SHA145eb200d6846c473262dda1becae85f165b2b7e4
SHA256a06fea027bb5a5bdcb3ddfac192b5f6a43a3cd8a39d3bac2141d723aa72f83d4
SHA512e116d0c8755bf3022023255b895a429580d9aa3c47645ee5d8e9937cae2163a89a5a6559af230d32d31126bb0a4108dc2399f46de62a317add14a5213df8fe06