Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
d28bf21cff89c34058c7469d313e38c0_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d28bf21cff89c34058c7469d313e38c0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
d28bf21cff89c34058c7469d313e38c0_NEIKI.exe
-
Size
79KB
-
MD5
d28bf21cff89c34058c7469d313e38c0
-
SHA1
9a748af1e7384ca0858d8ccf1030ed1b8dcd2b9c
-
SHA256
e4f8de0e623bcb09e14e0b6b63991759bf8498a3722974890de4b1f199c588af
-
SHA512
42ab8b7c340bc47460b843747532df28a95b46fb9f5467ca700397d1f4ad948feafe8c4bed2879d53f0dfe96c21b231a12ff5b7d9a8445a728b12816f37202db
-
SSDEEP
1536:zvtWgNR4gnuf/mNv4OQA8AkqUhMb2nuy5wgIP0CSJ+5y9B8GMGlZ5G:zvtWgcBf+vdGdqU7uy5w9WMy9N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 288 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2316 cmd.exe 2316 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2316 2364 d28bf21cff89c34058c7469d313e38c0_NEIKI.exe 29 PID 2364 wrote to memory of 2316 2364 d28bf21cff89c34058c7469d313e38c0_NEIKI.exe 29 PID 2364 wrote to memory of 2316 2364 d28bf21cff89c34058c7469d313e38c0_NEIKI.exe 29 PID 2364 wrote to memory of 2316 2364 d28bf21cff89c34058c7469d313e38c0_NEIKI.exe 29 PID 2316 wrote to memory of 288 2316 cmd.exe 30 PID 2316 wrote to memory of 288 2316 cmd.exe 30 PID 2316 wrote to memory of 288 2316 cmd.exe 30 PID 2316 wrote to memory of 288 2316 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d28bf21cff89c34058c7469d313e38c0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\d28bf21cff89c34058c7469d313e38c0_NEIKI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:288
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5d0d163a9abcfe85847b92aff3c4b558a
SHA13c117a142ed5dc4292913b81984232a9918d086c
SHA25677d8f59b94a00b1ade8d203367466ac5c647784222c34b7a5e2e406f4ab49437
SHA512cf5d354049c55479617b80237f7938ee917df2b545cdc4e6a59c5d7cd6dd34ef4d8afb9b7362de980cc018a8cc9738ee24b0ca66168f965efcd4c1236ff756f7