Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe
-
Size
150KB
-
MD5
24798eb5b4eaf3f0bd117172809a2cc0
-
SHA1
3a5ae55e337846498f9963db084694cada3d1b93
-
SHA256
6f2d33314bc102d86febbc4fdb767153b961ab81a985d103ba4578ee4543254e
-
SHA512
0bc39fc14c8abcf777f3f5bbc776dff9c13bc2d06db8ed4e659ff19602b1d9af74d2bbf041a9ae24e4b02f593e4cdef392730e95437ac488212e5475049f30af
-
SSDEEP
3072:ge6FFhMinon+m7Of18tZ9PHnF+orVd/WDbf2k+nOkxCu665S3:lWpcrPHnf0+vxCb6o
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2520 pfwoyhh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\pfwoyhh.exe 24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe File created C:\PROGRA~3\Mozilla\bjvdwgg.dll pfwoyhh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2844 24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe 2520 pfwoyhh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2520 2376 taskeng.exe 29 PID 2376 wrote to memory of 2520 2376 taskeng.exe 29 PID 2376 wrote to memory of 2520 2376 taskeng.exe 29 PID 2376 wrote to memory of 2520 2376 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2844
-
C:\Windows\system32\taskeng.exetaskeng.exe {1CB16B23-3DB8-4C5D-A577-2400E1FD8FEF} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\PROGRA~3\Mozilla\pfwoyhh.exeC:\PROGRA~3\Mozilla\pfwoyhh.exe -zhxzcvh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD55dc36a4fad6d6a00864a7892a1f39c2c
SHA14755064f5ff07752e28110b9c6cbaf6bf8825133
SHA2560159ddd9fd5f8278d3a9b51125b7eb5eebece3e7dad8ae8ff1262700e001aac9
SHA512cd4b0e9357a89fe8a2eac4a9460e04a242903f210b8c19ff60999712cac20f2a6871d789fda6da1eb6e505fc230017ae5386bc5205f0d774584773a43333e954