Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 23:54
Behavioral task
behavioral1
Sample
6e65f50810777133df7cc6e393f15660_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6e65f50810777133df7cc6e393f15660_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
6e65f50810777133df7cc6e393f15660_NEIKI.exe
-
Size
117KB
-
MD5
6e65f50810777133df7cc6e393f15660
-
SHA1
54e733bd32440c7f122bad17ba65923391d2ba99
-
SHA256
dcb8ed40c023c9a42708b2d3ade7923f9b278169eb51c1230ebdde5ef41144dc
-
SHA512
d5c607f9a45a036a34c8d8fbaa1b98847eaf26a884447a27e64ebb3b9ec0898d7d3b39c95ba29d805593c79e95a0f5e528bf3c113ea8e66a5f571d3cd6b2d92c
-
SSDEEP
3072:R9DzKYSP5nfpRrt94MOTHId1WOalUSGAzGLAuuov98m5SSTY:R99ShxhtSH8dyUSP6AuJV89
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2920 wrvdfyg.exe -
resource yara_rule behavioral1/memory/2192-0-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/files/0x0035000000014171-7.dat upx behavioral1/memory/2920-9-0x0000000000400000-0x0000000000465000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\wrvdfyg.exe 6e65f50810777133df7cc6e393f15660_NEIKI.exe File created C:\PROGRA~3\Mozilla\klztrnd.dll wrvdfyg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2920 2076 taskeng.exe 29 PID 2076 wrote to memory of 2920 2076 taskeng.exe 29 PID 2076 wrote to memory of 2920 2076 taskeng.exe 29 PID 2076 wrote to memory of 2920 2076 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e65f50810777133df7cc6e393f15660_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\6e65f50810777133df7cc6e393f15660_NEIKI.exe"1⤵
- Drops file in Program Files directory
PID:2192
-
C:\Windows\system32\taskeng.exetaskeng.exe {A9729A31-116D-47BC-A837-40A8F928B21A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\PROGRA~3\Mozilla\wrvdfyg.exeC:\PROGRA~3\Mozilla\wrvdfyg.exe -hzyjzia2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5a98e5f4f5b54799461dd17ad587fd6ca
SHA14a218a3bd178bd9f22f1976309631134b75460df
SHA2568fc4fc2e62ee2b3e0d8216de9ddd2d9cbca596c8e021730bfb54ad2fdfbf2729
SHA512d098c30a650644fe70ce45994eb9f01360a00b72dc1d061f5aab2c621bea7af6b131a2895309dafa42726edb90b37eb30b8a86a5700336fad421e1d03b90e213