Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
a7bef4732debeac586785dab42b9dd70_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7bef4732debeac586785dab42b9dd70_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
a7bef4732debeac586785dab42b9dd70_NEIKI.exe
-
Size
1.2MB
-
MD5
a7bef4732debeac586785dab42b9dd70
-
SHA1
68241697800ba9585386bc22544a2493e988dc71
-
SHA256
88ef926661943a513da9db1b87a846ac5abb684bb4cd1627ca73be21ba5c7c86
-
SHA512
fa822cac54a4a1240db575917689b6dbf8cf51129a072e916eccc38859be422ef8b3d8855fe4f976ec6d0abdb01ba8cfb02446114218a86f33a79b436ba6891a
-
SSDEEP
12288:BgwuX+Zw9S0/Z3SfJKW96B/m4OvdiPGaPueEjzVqj83cBBS1UihZk5TzHO81HkwE:Ouq4ugJKpWdicLsBBS1UiuTr1HT4B
Malware Config
Signatures
-
Renames multiple (219) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts a7bef4732debeac586785dab42b9dd70_NEIKI.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 4832 Logo1_.exe 3900 a7bef4732debeac586785dab42b9dd70_NEIKI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" a7bef4732debeac586785dab42b9dd70_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\rmic.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\wsgen.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe.Exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE.Exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe.Exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\jmap.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\notification_helper.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateComRegisterShell64.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\javaws.exe.Exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{8AF88020-77AD-4F36-932C-90EB553F7474}\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe.Exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe.Exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\MicrosoftEdgeUpdate.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\SoundRec.exe Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler64.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\javaw.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateOnDemand.exe.Exe Logo1_.exe File created C:\Program Files\7-Zip\Uninstall.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe a7bef4732debeac586785dab42b9dd70_NEIKI.exe File opened for modification C:\Windows\uninstall\rundl132.exe Logo1_.exe File created C:\Windows\RichDll.dll Logo1_.exe File created C:\Windows\uninstall\rundl132.exe a7bef4732debeac586785dab42b9dd70_NEIKI.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe 4832 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4648 wrote to memory of 4116 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 84 PID 4648 wrote to memory of 4116 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 84 PID 4648 wrote to memory of 4116 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 84 PID 4116 wrote to memory of 1348 4116 net.exe 86 PID 4116 wrote to memory of 1348 4116 net.exe 86 PID 4116 wrote to memory of 1348 4116 net.exe 86 PID 4648 wrote to memory of 2964 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 90 PID 4648 wrote to memory of 2964 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 90 PID 4648 wrote to memory of 2964 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 90 PID 4648 wrote to memory of 4832 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 91 PID 4648 wrote to memory of 4832 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 91 PID 4648 wrote to memory of 4832 4648 a7bef4732debeac586785dab42b9dd70_NEIKI.exe 91 PID 4832 wrote to memory of 3700 4832 Logo1_.exe 93 PID 4832 wrote to memory of 3700 4832 Logo1_.exe 93 PID 4832 wrote to memory of 3700 4832 Logo1_.exe 93 PID 2964 wrote to memory of 3900 2964 cmd.exe 95 PID 2964 wrote to memory of 3900 2964 cmd.exe 95 PID 2964 wrote to memory of 3900 2964 cmd.exe 95 PID 3700 wrote to memory of 4744 3700 net.exe 96 PID 3700 wrote to memory of 4744 3700 net.exe 96 PID 3700 wrote to memory of 4744 3700 net.exe 96 PID 4832 wrote to memory of 3860 4832 Logo1_.exe 98 PID 4832 wrote to memory of 3860 4832 Logo1_.exe 98 PID 4832 wrote to memory of 3860 4832 Logo1_.exe 98 PID 3860 wrote to memory of 3804 3860 net.exe 100 PID 3860 wrote to memory of 3804 3860 net.exe 100 PID 3860 wrote to memory of 3804 3860 net.exe 100 PID 4832 wrote to memory of 3692 4832 Logo1_.exe 56 PID 4832 wrote to memory of 3692 4832 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\a7bef4732debeac586785dab42b9dd70_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\a7bef4732debeac586785dab42b9dd70_NEIKI.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a48FF.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\a7bef4732debeac586785dab42b9dd70_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\a7bef4732debeac586785dab42b9dd70_NEIKI.exe"4⤵
- Executes dropped EXE
PID:3900
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4744
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3804
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566B
MD52c81c8610a8c0888fad34d8e0373faf6
SHA1c6ff6be0441061d60d970133f04cd681ada0282b
SHA256d48f894735ee1050aff1a952f71b2a8f36c67c07bfb626c8dc018539ba24ad28
SHA5120a71acb6419cb5dd390736fe2150b7bc777b5de5c64d5d702fee30627fb1d95c5befbcf55e1c2c332c37c6923a50f99ef831c44975d6087e22e54e32735d7431
-
Filesize
1.2MB
MD5a666608317f9e070e673979284b2f7dc
SHA1a6f3c4d5193aa52bfb039f481d25522bfd3280c4
SHA256ec98606a8f1d555b6a96fd49b59bfa9995066935cad2512dfec9a8f5b42caa01
SHA51259d161faee116ede83e61eda1d23060a07c10a4cf9cd2a3155bb27f5000c74c03c8b65211bb44cb331d92ca3e1bab460bb6ca8891eb3d51ce244c5e8e154b80a
-
Filesize
59KB
MD530e8aef12c7bc366048a967e0ceb7809
SHA1886846ea1b7b298c79c5397a07d40c3effcc5f81
SHA256437cab11e7ad63efbecc5af5f1f0e73a7c0bf20b44a0b5905993a769f95df6cd
SHA51259c30592acadc4b5e11e5015ac1a98496acbd097856bc40a91a9b63fe783d82dbe92354ac1aab4132b1af875032411bdbb21df7ec2648dbc7b9037e2a70c9e0e
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47