Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
1f7d5c41c77dece05b17edd609730b20_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f7d5c41c77dece05b17edd609730b20_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
1f7d5c41c77dece05b17edd609730b20_NEIKI.exe
-
Size
79KB
-
MD5
1f7d5c41c77dece05b17edd609730b20
-
SHA1
72066c8ac3c9e0709e611280cd1f93840d13a341
-
SHA256
6fe5d13da2832bddb4a654acf98d471db9f2f0e7d73993d4701c76e14770a488
-
SHA512
6718479e06ff9e300566b84689bc16915c6e4a6cd3587fbe7480dfbf37a10e455d1ac530f0489508716addf202738a375023a306201fa5d9d8639731e0a752ec
-
SSDEEP
1536:zvYONtUW2tbTs1OQA8AkqUhMb2nuy5wgIP0CSJ+5y6MB8GMGlZ5G:zvYODUTpfGdqU7uy5w9WMy6MN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2752 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2672 cmd.exe 2672 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2672 2184 1f7d5c41c77dece05b17edd609730b20_NEIKI.exe 29 PID 2184 wrote to memory of 2672 2184 1f7d5c41c77dece05b17edd609730b20_NEIKI.exe 29 PID 2184 wrote to memory of 2672 2184 1f7d5c41c77dece05b17edd609730b20_NEIKI.exe 29 PID 2184 wrote to memory of 2672 2184 1f7d5c41c77dece05b17edd609730b20_NEIKI.exe 29 PID 2672 wrote to memory of 2752 2672 cmd.exe 30 PID 2672 wrote to memory of 2752 2672 cmd.exe 30 PID 2672 wrote to memory of 2752 2672 cmd.exe 30 PID 2672 wrote to memory of 2752 2672 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f7d5c41c77dece05b17edd609730b20_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\1f7d5c41c77dece05b17edd609730b20_NEIKI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2752
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD59637f9c964258932aecf3e5faa162f66
SHA1469d160c08483f655995bed11822601c65eedd8a
SHA256aa0ded7ea98b7e88d5a1f4cce5f635afa315849bb8b19483915bbf19c589794b
SHA512fc07dd6351b855f23ffd4ac646096fbc6f7fd96b9cbb2f554a4dc90b3afa43506395e8eba2552513a45895843f803c1194005f74a7652b8bf5fb3201ad44cd73