Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
d28bf21cff89c34058c7469d313e38c0_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d28bf21cff89c34058c7469d313e38c0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
d28bf21cff89c34058c7469d313e38c0_NEIKI.exe
-
Size
79KB
-
MD5
d28bf21cff89c34058c7469d313e38c0
-
SHA1
9a748af1e7384ca0858d8ccf1030ed1b8dcd2b9c
-
SHA256
e4f8de0e623bcb09e14e0b6b63991759bf8498a3722974890de4b1f199c588af
-
SHA512
42ab8b7c340bc47460b843747532df28a95b46fb9f5467ca700397d1f4ad948feafe8c4bed2879d53f0dfe96c21b231a12ff5b7d9a8445a728b12816f37202db
-
SSDEEP
1536:zvtWgNR4gnuf/mNv4OQA8AkqUhMb2nuy5wgIP0CSJ+5y9B8GMGlZ5G:zvtWgcBf+vdGdqU7uy5w9WMy9N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4684 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 540 wrote to memory of 1012 540 d28bf21cff89c34058c7469d313e38c0_NEIKI.exe 85 PID 540 wrote to memory of 1012 540 d28bf21cff89c34058c7469d313e38c0_NEIKI.exe 85 PID 540 wrote to memory of 1012 540 d28bf21cff89c34058c7469d313e38c0_NEIKI.exe 85 PID 1012 wrote to memory of 4684 1012 cmd.exe 86 PID 1012 wrote to memory of 4684 1012 cmd.exe 86 PID 1012 wrote to memory of 4684 1012 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d28bf21cff89c34058c7469d313e38c0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\d28bf21cff89c34058c7469d313e38c0_NEIKI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exePID:1012
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4684
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5d0d163a9abcfe85847b92aff3c4b558a
SHA13c117a142ed5dc4292913b81984232a9918d086c
SHA25677d8f59b94a00b1ade8d203367466ac5c647784222c34b7a5e2e406f4ab49437
SHA512cf5d354049c55479617b80237f7938ee917df2b545cdc4e6a59c5d7cd6dd34ef4d8afb9b7362de980cc018a8cc9738ee24b0ca66168f965efcd4c1236ff756f7