Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 11:21

General

  • Target

    7fb55085c4b668539854b10fe2336500_NEIKI.exe

  • Size

    262KB

  • MD5

    7fb55085c4b668539854b10fe2336500

  • SHA1

    9e8029b9991dfef6bc7eea1aea7e95857e06c7ee

  • SHA256

    a9a34dbfc4e5b987dec7c2c5a3192154a19ff00e7c5f0099b66899ddfbcfee42

  • SHA512

    bcf75556d5e7c6136e8901171a019211e06488769f10004d485a1912eca624f6b9b60047d81f8c47efb395c62fb248d06682ab3dd2e0c6898d5376c4c6e09a12

  • SSDEEP

    3072:O7BMvaWjzrLXQQJKgmSBAVpet2AgoPlMZN:saaWjz/gGKgmS+k2Ye

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fb55085c4b668539854b10fe2336500_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\7fb55085c4b668539854b10fe2336500_NEIKI.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Program Files (x86)\2892ff84\jusched.exe
      "C:\Program Files (x86)\2892ff84\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\2892ff84\2892ff84

    Filesize

    17B

    MD5

    2130fee70fc3f7c10d5279f96f98ad1e

    SHA1

    4307cef89171fa230048ea22546802198d888780

    SHA256

    3506e286f6223ccaf1665d4e457b712abeb527266ff28327ce60e37b9fbeb404

    SHA512

    67fa1bb31028ff3ba125f184207499b9205f58c9eef2ac948f5824475515c396b3d5f93e207cb96deffe1aedb286b1f935cc689c5d84449e51c517da1cffe2e5

  • C:\Program Files (x86)\2892ff84\jusched.exe

    Filesize

    262KB

    MD5

    3a382ac3504f678a8a7e705205adfeb4

    SHA1

    8953e2a981f3843360ca13e7d41e16c605dcb796

    SHA256

    2417780e8f72533efa85e1bc5c76ece89f2c7db78bdbe885769b1c5d12976078

    SHA512

    43f47c4993534cdd0611eb2a93152a07279efc4c4dfd75af9005d99a802802ab1a6b2a19a2d78949224dda38efe56ef6bf8e59692af880859faafe1e760093e5

  • memory/2364-12-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2860-0-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2860-10-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB