Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    21s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 06:32

General

  • Target

    f8b07bad7db22d0c641c54172ccc5370_NEIKI.exe

  • Size

    297KB

  • MD5

    f8b07bad7db22d0c641c54172ccc5370

  • SHA1

    34b5f50d6ba0a5153921b33258d943ad0ecea05d

  • SHA256

    8cac4cf5b54913686d919787ec3adc2a353b1314636482746bb7c93ee06d1c98

  • SHA512

    5da7c49f2a5566bec247e8f9f56e6f1861d0c01c0fbfbf1132f351014faa4f43ac10b19f8423271151bed821f60485b85365c831bf474d3909264bed0f05a9cd

  • SSDEEP

    6144:wlj7cMnC+OEXtIQqeHdA51d18T+G0QXMW30gPTB5/uwq:wlbC+NaKYE5Tf/K

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8b07bad7db22d0c641c54172ccc5370_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\f8b07bad7db22d0c641c54172ccc5370_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:748
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev3383.tmp!C:\Users\Admin\AppData\Local\Temp\f8b07bad7db22d0c641c54172ccc5370_NEIKI.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Users\Admin\AppData\Local\Temp\F8B07BAD7DB22D0C641C54172CCC5370_NEIKI.EXE
        3⤵
        • Executes dropped EXE
        PID:636
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev3383.tmp!C:\Users\Admin\AppData\Local\Temp\F8B07BAD7DB22D0C641C54172CCC5370_NEIKI.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\F8B07BAD7DB22D0C641C54172CCC5370_NEIKI.EXE

    Filesize

    297KB

    MD5

    4df029bd4dcff17def25a9884c7af899

    SHA1

    a337d68ed65f3d41f1949b6e4e7c367f82ef34b2

    SHA256

    ff8b28676952d726e8042664540f1444e604fef80f887fcabd249fff7c3bfb19

    SHA512

    ce7dec543d33d1a440764970e5b467cfe9a21bda3adee4df4607b7efa9191d832431f67cfda579e9886ceff4454ae27782d6528782bca062fe3099833fe7cfeb

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    dd68dc1f2acb8d56535514be222da2e9

    SHA1

    f8b48112bb5bff4d77e705ce05aa0f2dcb80c904

    SHA256

    38137371838a2b2704b823ed0fb8d6bb1d9cca9fc7da334535942ab1d489eb09

    SHA512

    2ebe2ea143735b014f5fced08a95a3e64a6c54a293a818a0d39555a31ea8d940b28ce9a6937f3d4d6cd449b849d5a1e8a645603c2571260bd6996bdb050bcb8a

  • C:\Windows\dev3383.tmp

    Filesize

    217KB

    MD5

    f8a38fd27da720881c0af1ac99b8c1ad

    SHA1

    2ed31938119e2ebdeb0f5539c985e9965aef72d7

    SHA256

    b2e32b3fa44b3a9a8fdfa906627355f6f48b4821929f9bce5ded2d07894361d4

    SHA512

    aafa05bc5bd68687b998fe4d9a619caecc65d14f317af7a05ac0ecab7e231891e8719029245dc84eddce20bdd4c0cc6f4ffafdf8200227746b28cc6628564495

  • memory/748-9-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/748-24-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1536-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1536-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2156-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2924-10-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2924-23-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB