Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 14:46

General

  • Target

    e1494b25f6025127aa711131b1a8dca0_NEIKI.exe

  • Size

    6.6MB

  • MD5

    e1494b25f6025127aa711131b1a8dca0

  • SHA1

    73bc40d2bd62c12d3487dfed6f2439fef1cf2846

  • SHA256

    c41ec3a9224a131c1e118fb6927ce73ad0c64bb66b727fe185f1eb114a8f8129

  • SHA512

    f9780c4789ec79851ce826008c013a9dab3b63360b22d7c01d5bb9638571cd1c310455f251a752ac0a29c423d80cecba72beeceb0f196f8e40b9ea930907caad

  • SSDEEP

    1536:6pgpHzb9dZVX9fHMvG0D3XJBelyzq1V/Bf20mIc7Z:4gXdZt9P6D3XJUMzqz/BO0o7Z

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1494b25f6025127aa711131b1a8dca0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\e1494b25f6025127aa711131b1a8dca0_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsdEE0.tmp\ioSpecial.ini

    Filesize

    760B

    MD5

    218b95a145ca4c8c9e5ccd7bf3ba5e7c

    SHA1

    34f050bc55c2ea55faee49c240b55864d7611c02

    SHA256

    b66ce22a83cb13647cf54f59b55d57c34b4cc9f213cb4e12455d0fb7fa3435ba

    SHA512

    88e1aa007b83e8e9b519118c9209b3ca8fb01026cf3f0fd443cdef5451b67d606873a1644ccfef156cc8694794f6902afd5ba1ca8fcae9ad064f7d1dbedfecad

  • \Users\Admin\AppData\Local\Temp\nsdEE0.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsdEE0.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f