Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
a88cd225dc3dd5b65d393cf2516a8940
-
SHA1
2ff0966c30e48d6365a0e00e0bc91dca9fcb92c2
-
SHA256
2ea1582d710052a04bb362bc6827422b246247278a41c386d7131658ee9b4bcd
-
SHA512
6047c81140ff9f4606e6cc2ad640784922a261929385fa0615639eda23e7be5ba19ee9bfa5358c160f5aa3f0ec647ad0b1ffe4f7b7b1c5c12680b19bf66ac475
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBP9w4Sx:+R0pI/IQlUoMPdmpSpr4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4888 adobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ7S\\dobdevec.exe" a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files4I\\adobsys.exe" a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 4888 adobsys.exe 4888 adobsys.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3020 wrote to memory of 4888 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 85 PID 3020 wrote to memory of 4888 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 85 PID 3020 wrote to memory of 4888 3020 a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a88cd225dc3dd5b65d393cf2516a8940_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Files4I\adobsys.exeC:\Files4I\adobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5f1385c99a05c24a22fb249d072ae8b8a
SHA1f224560dbadf02a3bbd3d994a08da9c36b7b962b
SHA2564ebdb551fc8e8357abe22146061b4624c222ea153a52fcf7542e6235b4a6e569
SHA5126cabec6cc048ef22cb34ffbb0b7713513b395d13b9389f6cf6a071402168f9a08d8acbee9a9c9a05ef92806ca0afa0530d1c4ad178d640636e8bef3926e35d79
-
Filesize
2.7MB
MD53395a2fe9c40301d76b68db3d6342b58
SHA1c4576677d785c4a76d258f9ba8cf2fbf0494c149
SHA256fd79280cee2fd74be4ccc13274d709596a4f70fc61a29d7e389c8c3988e38e53
SHA512dc468799b5fe2959424a15fa5c520de1bc754aba13ead7a2621bf0e9fd3373fb20dafec65bcf21185a1a1ed819577a61f1d61a978296ddf786018cbf06c96250
-
Filesize
203B
MD59995a100ef5cdd34f54df9c94f312c71
SHA1f7aaad9a236be77c457bd5ef8cf8e99e80b167da
SHA25640f3f585c88bb569533d2f217505288a46b43bf0dbfb934421fc1b216b338176
SHA5124b3c6979edd7b111b01f158091f6bf0bceafb5564c4254617a76ce3568336455156e9c26361752a2d2b378c30e4a49a2aa622afc0b6fb8b0531a8e6d149fb7ff