Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
fac9a87226a0d93291f97d1fb6618230_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fac9a87226a0d93291f97d1fb6618230_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
fac9a87226a0d93291f97d1fb6618230_NEIKI.exe
-
Size
156KB
-
MD5
fac9a87226a0d93291f97d1fb6618230
-
SHA1
2c4b982850064f4e4a1be01d2b7debdacbe2cd39
-
SHA256
0dd53eb18a909b28fcfb935396b62d17fb27b078e5f61a1e7944a0d66b871c77
-
SHA512
ec38d0f9ae1465c54e9f78e712a29beee4a861efe16de777776b0551558f63b9ba8f78c2e33509d5cbd734c506d0645d175909282c8331f2670e3d355d579743
-
SSDEEP
1536:Y1pMooIDVoHmSiUsr9QUpHgsbRBGS17l5/rlAOXBOhwLAKtoJi+A7pfYoyv8+0Eu:Y7MLuamxrOUJgsbT7OukKtdxyv8+jS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fac9a87226a0d93291f97d1fb6618230_NEIKI.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wuede.exe -
Executes dropped EXE 1 IoCs
pid Process 2616 wuede.exe -
Loads dropped DLL 2 IoCs
pid Process 2300 fac9a87226a0d93291f97d1fb6618230_NEIKI.exe 2300 fac9a87226a0d93291f97d1fb6618230_NEIKI.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /u" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /k" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /p" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /c" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /b" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /t" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /i" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /d" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /s" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /y" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /f" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /a" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /e" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /g" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /x" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /l" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /n" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /u" fac9a87226a0d93291f97d1fb6618230_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /m" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /v" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /o" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /z" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /h" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /w" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /r" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /q" wuede.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuede = "C:\\Users\\Admin\\wuede.exe /j" wuede.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2300 fac9a87226a0d93291f97d1fb6618230_NEIKI.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe 2616 wuede.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2300 fac9a87226a0d93291f97d1fb6618230_NEIKI.exe 2616 wuede.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2616 2300 fac9a87226a0d93291f97d1fb6618230_NEIKI.exe 28 PID 2300 wrote to memory of 2616 2300 fac9a87226a0d93291f97d1fb6618230_NEIKI.exe 28 PID 2300 wrote to memory of 2616 2300 fac9a87226a0d93291f97d1fb6618230_NEIKI.exe 28 PID 2300 wrote to memory of 2616 2300 fac9a87226a0d93291f97d1fb6618230_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fac9a87226a0d93291f97d1fb6618230_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\fac9a87226a0d93291f97d1fb6618230_NEIKI.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\wuede.exe"C:\Users\Admin\wuede.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD52ca8972c24208f5acc7fa18aa41662d2
SHA19ea78cde3c2c8e44d7e821591cbecee4dc3b9176
SHA25628a122b92d90d5842aecb8540a512bfa2981585e87efb8a981f7b68845a33bfa
SHA5121ac0b5556f4b1c9590719ce1f8561dbc900bafc0ac01ef94cbbc0ea546e3032349dc9759b5c0914fa6618cf587bf8322f11b838d51e7a607ef42ee47aa817f1f