Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
a811a3c1e769aa79d9493942c4976160_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a811a3c1e769aa79d9493942c4976160_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
a811a3c1e769aa79d9493942c4976160_NEIKI.exe
-
Size
1.6MB
-
MD5
a811a3c1e769aa79d9493942c4976160
-
SHA1
e972b66d9eaf4b26f61fcfe762ea03e3ee57f85b
-
SHA256
9b0ec0360c57721dba7aa2cdae5cff0eec452c1879763afa0c74cc4aa7e747db
-
SHA512
78ec5b29e403fd8e14b4f8a2f31548a17063e7a51dc0bff97986e5fa06eb29dd80f977e1460efa815926b21457bca97d88f62401166113f2feb558aa2a16563e
-
SSDEEP
24576:PFOaskwW4oHIIH950ysEtbJ4gwMmaRaV7rzwYVtH0E8ma8jT+RRiQIWYH17tu6t2:trwCB9+YOaILVtH0E8maWGiQI3V7tNt2
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 2936 a811a3c1e769aa79d9493942c4976160_neiki.exe 632 icsys.icn.exe 4524 explorer.exe 4620 spoolsv.exe 3508 svchost.exe 3868 spoolsv.exe -
resource yara_rule behavioral2/files/0x0007000000023431-7.dat vmprotect -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe a811a3c1e769aa79d9493942c4976160_NEIKI.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe 632 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4524 explorer.exe 3508 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 632 icsys.icn.exe 632 icsys.icn.exe 4524 explorer.exe 4524 explorer.exe 4620 spoolsv.exe 4620 spoolsv.exe 3508 svchost.exe 3508 svchost.exe 3868 spoolsv.exe 3868 spoolsv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2936 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 82 PID 1116 wrote to memory of 2936 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 82 PID 1116 wrote to memory of 2936 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 82 PID 1116 wrote to memory of 632 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 83 PID 1116 wrote to memory of 632 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 83 PID 1116 wrote to memory of 632 1116 a811a3c1e769aa79d9493942c4976160_NEIKI.exe 83 PID 632 wrote to memory of 4524 632 icsys.icn.exe 84 PID 632 wrote to memory of 4524 632 icsys.icn.exe 84 PID 632 wrote to memory of 4524 632 icsys.icn.exe 84 PID 4524 wrote to memory of 4620 4524 explorer.exe 85 PID 4524 wrote to memory of 4620 4524 explorer.exe 85 PID 4524 wrote to memory of 4620 4524 explorer.exe 85 PID 4620 wrote to memory of 3508 4620 spoolsv.exe 86 PID 4620 wrote to memory of 3508 4620 spoolsv.exe 86 PID 4620 wrote to memory of 3508 4620 spoolsv.exe 86 PID 3508 wrote to memory of 3868 3508 svchost.exe 87 PID 3508 wrote to memory of 3868 3508 svchost.exe 87 PID 3508 wrote to memory of 3868 3508 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a811a3c1e769aa79d9493942c4976160_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\a811a3c1e769aa79d9493942c4976160_NEIKI.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
\??\c:\users\admin\appdata\local\temp\a811a3c1e769aa79d9493942c4976160_neiki.exec:\users\admin\appdata\local\temp\a811a3c1e769aa79d9493942c4976160_neiki.exe2⤵
- Executes dropped EXE
PID:2936
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4524 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3508 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3868
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5b2df0057569ffe9c42fa88e639ac7046
SHA11798be8ca6f11c08b982f60e42d1c632f0631077
SHA256eb507ee4b4b347daa400c41408146a2ffc0503496e500b8177dd1a9e877d7924
SHA5121ef703191775e6f32790664ea34b80e09125750a5906c4097a5cb478ebe56cb9b4ebf3b64b5249ea6c4afb1fc158380340cab7c76c2489e724804906278e0233
-
Filesize
135KB
MD5be265b1e6740ec88df722c23028f865c
SHA117565611eb2bcb79e11898b06309d5c6c1d414dd
SHA2568acf1f067648deb6cd14fc399720db54f3c88a566c633e38e56076b9ed73be8e
SHA51216b709d397cab6d943c3b9ac4e34705d7405b1fd07c85190d16b52f12682a5fb1a234a22b61b0aafafcfe37db3e26541447c6bffd4347fd1cc1507777eb85867
-
Filesize
135KB
MD56477f6d1cd07c56e8f29ba684e030ae5
SHA1880ffe02c380bb2951f88b30a928be7a87587146
SHA25672de6d92b4697384847573945625a3be3183bbec6d413ce38779f48ea8a1a685
SHA5120aa55d6f76fc87f0e744a8143f7340b45f446f1e946e24a6ad03665966d8cc5076eaac3e3cbf92d3af3b056642d8e2627a64cb21c40de9154a85d405380d708f
-
Filesize
135KB
MD52ec8328630ed7c6d505830c0bbd6557c
SHA1d2abdeb95896e04169665c77944fbb1912314d79
SHA256d0c7c894ae995a96e96a1cc19b749b0530c3b31ef2b1c73b6d3e8b07a6bc8520
SHA5125d802c1657bb066b48f4a2033d07e92c0326a3ded750ec3fe2debe30b047397c87889a6698ede9e7de7ebd125ed7b004cd5df2d26c90fa523cf28e167810d9e4
-
Filesize
135KB
MD585770674a43c8281b89af7163e782271
SHA11fdd62f8ce1113fe0f8e90cc0dee9748a03f212d
SHA256e4cb2c6155c793578ce04fa0f1b0ff6614370107a1f87fa8345185ac63bfcabb
SHA5121b9d32754b829f237b919744d1ce507e130d781e6f62b8f455fbd8bb3d5ea8f0850a665af1649b1f03a467e33346c82dcf2e3629f120bdc70d89b013afb27993