Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 23:54

General

  • Target

    6e65f50810777133df7cc6e393f15660_NEIKI.exe

  • Size

    117KB

  • MD5

    6e65f50810777133df7cc6e393f15660

  • SHA1

    54e733bd32440c7f122bad17ba65923391d2ba99

  • SHA256

    dcb8ed40c023c9a42708b2d3ade7923f9b278169eb51c1230ebdde5ef41144dc

  • SHA512

    d5c607f9a45a036a34c8d8fbaa1b98847eaf26a884447a27e64ebb3b9ec0898d7d3b39c95ba29d805593c79e95a0f5e528bf3c113ea8e66a5f571d3cd6b2d92c

  • SSDEEP

    3072:R9DzKYSP5nfpRrt94MOTHId1WOalUSGAzGLAuuov98m5SSTY:R99ShxhtSH8dyUSP6AuJV89

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e65f50810777133df7cc6e393f15660_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\6e65f50810777133df7cc6e393f15660_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2192
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {A9729A31-116D-47BC-A837-40A8F928B21A} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\PROGRA~3\Mozilla\wrvdfyg.exe
      C:\PROGRA~3\Mozilla\wrvdfyg.exe -hzyjzia
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\wrvdfyg.exe

    Filesize

    117KB

    MD5

    a98e5f4f5b54799461dd17ad587fd6ca

    SHA1

    4a218a3bd178bd9f22f1976309631134b75460df

    SHA256

    8fc4fc2e62ee2b3e0d8216de9ddd2d9cbca596c8e021730bfb54ad2fdfbf2729

    SHA512

    d098c30a650644fe70ce45994eb9f01360a00b72dc1d061f5aab2c621bea7af6b131a2895309dafa42726edb90b37eb30b8a86a5700336fad421e1d03b90e213

  • memory/2192-0-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2192-1-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/2192-2-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2192-6-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2920-9-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2920-10-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2920-14-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB