Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 16:24

General

  • Target

    8eb234e94e4c69486886358f9c5f6e983aa2dfa10494be4ce720431b01bc28df_NeikiAnalytics.exe

  • Size

    3.0MB

  • MD5

    80d342bb3525d39db873b7775eb563b0

  • SHA1

    28b8867d01c8e2c5f8ed2bc58a4a12d9c63f9de4

  • SHA256

    8eb234e94e4c69486886358f9c5f6e983aa2dfa10494be4ce720431b01bc28df

  • SHA512

    24051e407fdff0f62959476f9fdb71422901e949d8a9a0ad37453bf38c06db575af113b651be460cfe49fa1933ab16eccdf8830b811115b217523f2479396f68

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB4B/bSqz8:sxX7QnxrloE5dpUp3bVz8

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8eb234e94e4c69486886358f9c5f6e983aa2dfa10494be4ce720431b01bc28df_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8eb234e94e4c69486886358f9c5f6e983aa2dfa10494be4ce720431b01bc28df_NeikiAnalytics.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2812
    • C:\AdobeZW\adobloc.exe
      C:\AdobeZW\adobloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AdobeZW\adobloc.exe

    Filesize

    57KB

    MD5

    a54d72e8045190fcd1a7c29fae94a21c

    SHA1

    f2ea661cc3cf0731a34224f5856fb93924eb24b2

    SHA256

    0b20c762da9a21258c1c72f455e159b8dace732893ef98e5aa50977354b417f2

    SHA512

    695ebd676bd1ca7122544e8b8deb2955ca2b1188a1354b07706a7fc0b7a83480ec3d0f69b58b9d585933a9b10fc174c22ef9f24672c820f5088fa4a114a0c123

  • C:\KaVBYR\dobdevsys.exe

    Filesize

    113KB

    MD5

    f5f3740bdfc437cbb9a86a79eed01d8a

    SHA1

    f62d308b99241e5fa0ffd95e5308b3a0e655aafa

    SHA256

    d820e3ed971e9b9ac83125ccc49b3b298541863f1a235d35b43488b0ca7ded11

    SHA512

    fb08db61282be7378ddf2cf99f109e32e2244a5827c11e5c96669c5ecccf37cf9914e481344ee41f9b1ac16ac01f05df959d52509a8335ba08361a6186d66653

  • C:\KaVBYR\dobdevsys.exe

    Filesize

    3.0MB

    MD5

    803133bb43598991c1da6fb63c708758

    SHA1

    4ac50bdb42c69ed3e5f68199469b8c5bf5c5f271

    SHA256

    01ed55c87c308f7580f403de952a2e8ce93476b703ad867e3e4e623270aab5ad

    SHA512

    f38297dddf2a4d8d05b8a8608c9884e633d42258cc507e65eb9f10ca02799b5819cd7b0192731587c293daec37a33a19e202fb89692d435d785803aa5f86b74c

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    169B

    MD5

    2af9b1270a182a4399a02691775dc1c2

    SHA1

    f22846a8aa45b9940afbd98fd42a9b486a7a4f02

    SHA256

    c03fea4b775d28ee66de4d2fc62ceeccab996b6f321188efb99b20c00bedcfd6

    SHA512

    e07f41e2ec30cbf2c8df36dfb999229cde714f3324d9ee9d7cce04a8ff82f66fe097129dda68dc6a8858d31b4317bc427f5c8848c89c0e205add4997e4055dd1

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    201B

    MD5

    f972c5e4c0140fba9f009716e4cd7b69

    SHA1

    33058fe30867529e3328b3ccfdc925024e48d557

    SHA256

    5d34b96013b6adb91b97c723c10d8c9aa7643543668802533ab75d3dcb0b3f38

    SHA512

    c26ae81499717d5f3e0010c10594cc29a35a0d5399699b65926deb8e80da8eb1b3bdf4ec6dfc51d5279c5c26ec5959b4691bf08f8c8dc7c6d9f8ded30e1069e3

  • \AdobeZW\adobloc.exe

    Filesize

    3.0MB

    MD5

    aff40c6b0a55c4687d889ee26083dd66

    SHA1

    988c0143b3e0c4db4b192650e8782c16771e4ab8

    SHA256

    74c0293bb606fdcf6463c7be101ae4439f222e2c7013c58e6f8618b880621270

    SHA512

    1cd0390447b54f5681b52d101db510477aeb171637adfc561b6ad8086dcbcf086216c46d2b0fa980614b79838bfb1a6f20fdd79b0fb166852941cf03a1cfbd90

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe

    Filesize

    3.0MB

    MD5

    0339880786d6fb81ab49f9de46c9c369

    SHA1

    d667cd9b6a9737c2ac633803608111797ccc5e78

    SHA256

    01c36bc6df0fb21b5b08a5d78e6225bfc955b15174d1b19e754e6945e9ac1b52

    SHA512

    6f2535addd15c109507eca466967e165493f8ff75bc9901cbcdf77ff715fa285d3c07d0d602a9b91b0fd404b905c89a3f201d539d3a2ecb9183dc8d246493ae0