Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 08:15

General

  • Target

    24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe

  • Size

    150KB

  • MD5

    24798eb5b4eaf3f0bd117172809a2cc0

  • SHA1

    3a5ae55e337846498f9963db084694cada3d1b93

  • SHA256

    6f2d33314bc102d86febbc4fdb767153b961ab81a985d103ba4578ee4543254e

  • SHA512

    0bc39fc14c8abcf777f3f5bbc776dff9c13bc2d06db8ed4e659ff19602b1d9af74d2bbf041a9ae24e4b02f593e4cdef392730e95437ac488212e5475049f30af

  • SSDEEP

    3072:ge6FFhMinon+m7Of18tZ9PHnF+orVd/WDbf2k+nOkxCu665S3:lWpcrPHnf0+vxCb6o

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\24798eb5b4eaf3f0bd117172809a2cc0_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2844
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {1CB16B23-3DB8-4C5D-A577-2400E1FD8FEF} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\PROGRA~3\Mozilla\pfwoyhh.exe
      C:\PROGRA~3\Mozilla\pfwoyhh.exe -zhxzcvh
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\pfwoyhh.exe

    Filesize

    150KB

    MD5

    5dc36a4fad6d6a00864a7892a1f39c2c

    SHA1

    4755064f5ff07752e28110b9c6cbaf6bf8825133

    SHA256

    0159ddd9fd5f8278d3a9b51125b7eb5eebece3e7dad8ae8ff1262700e001aac9

    SHA512

    cd4b0e9357a89fe8a2eac4a9460e04a242903f210b8c19ff60999712cac20f2a6871d789fda6da1eb6e505fc230017ae5386bc5205f0d774584773a43333e954

  • memory/2520-7-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2520-8-0x0000000000880000-0x00000000008DB000-memory.dmp

    Filesize

    364KB

  • memory/2520-9-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2520-11-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2844-0-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2844-2-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2844-1-0x0000000000300000-0x000000000035B000-memory.dmp

    Filesize

    364KB

  • memory/2844-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB