Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 20:31 UTC
Behavioral task
behavioral1
Sample
41b399d066faef52858f02e65f307300_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
41b399d066faef52858f02e65f307300_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
41b399d066faef52858f02e65f307300_NEIKI.exe
-
Size
29KB
-
MD5
41b399d066faef52858f02e65f307300
-
SHA1
fa3320164e52fa3d2cdf10ce308e674f488a5ff4
-
SHA256
961fb7e897001ff74d13296e82a80c2089ea9c990f9a7ddde607694b16371ca8
-
SHA512
3c6f074f1e39a9a09f439a198f4760f03d1931d74519be9ece33b6a1757b4b2013e1f8b27d7340ffe0004fbd6e213b978edd98ee3e8fe8a5a07092a8aa381996
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/S:AEwVs+0jNDY1qi/qa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 288 services.exe -
resource yara_rule behavioral1/memory/2440-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2440-4-0x00000000002A0000-0x00000000002A8000-memory.dmp upx behavioral1/files/0x0039000000013362-9.dat upx behavioral1/memory/288-10-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2440-16-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/288-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/288-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/288-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/288-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/288-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/288-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/288-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/288-47-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2440-51-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/288-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/288-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-64.dat upx behavioral1/memory/2440-77-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/288-78-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2440-82-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/288-83-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2440-84-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/288-85-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/288-90-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 41b399d066faef52858f02e65f307300_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe 41b399d066faef52858f02e65f307300_NEIKI.exe File created C:\Windows\services.exe 41b399d066faef52858f02e65f307300_NEIKI.exe File opened for modification C:\Windows\java.exe 41b399d066faef52858f02e65f307300_NEIKI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 288 2440 41b399d066faef52858f02e65f307300_NEIKI.exe 28 PID 2440 wrote to memory of 288 2440 41b399d066faef52858f02e65f307300_NEIKI.exe 28 PID 2440 wrote to memory of 288 2440 41b399d066faef52858f02e65f307300_NEIKI.exe 28 PID 2440 wrote to memory of 288 2440 41b399d066faef52858f02e65f307300_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\41b399d066faef52858f02e65f307300_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\41b399d066faef52858f02e65f307300_NEIKI.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:288
-
Network
-
Remote address:8.8.8.8:53Requestalumni.caltech.eduIN MXResponsealumni.caltech.eduIN MXalumni-caltech-edumail protectionoutlookcom
-
Remote address:8.8.8.8:53Requestalumni-caltech-edu.mail.protection.outlook.comIN AResponsealumni-caltech-edu.mail.protection.outlook.comIN A52.101.42.6alumni-caltech-edu.mail.protection.outlook.comIN A52.101.194.3alumni-caltech-edu.mail.protection.outlook.comIN A52.101.8.44alumni-caltech-edu.mail.protection.outlook.comIN A52.101.11.7alumni-caltech-edu.mail.protection.outlook.comIN A52.101.42.13alumni-caltech-edu.mail.protection.outlook.comIN A52.101.40.1alumni-caltech-edu.mail.protection.outlook.comIN A52.101.41.0
-
Remote address:8.8.8.8:53Requestgzip.orgIN MXResponsegzip.orgIN MX�
-
Remote address:8.8.8.8:53Requestgzip.orgIN AResponsegzip.orgIN A85.187.148.2
-
Remote address:8.8.8.8:53Requestalumni.caltech.eduIN AResponsealumni.caltech.eduIN A75.2.70.75alumni.caltech.eduIN A99.83.190.102
-
Remote address:8.8.8.8:53Requestmx.alumni.caltech.eduIN AResponse
-
Remote address:8.8.8.8:53Requestmx.gzip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestmail.alumni.caltech.eduIN AResponse
-
Remote address:8.8.8.8:53Requestsmtp.alumni.caltech.eduIN AResponse
-
Remote address:8.8.8.8:53Requestmail.gzip.orgIN AResponsemail.gzip.orgIN CNAMEgzip.orggzip.orgIN A85.187.148.2
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
52.101.42.6:25alumni-caltech-edu.mail.protection.outlook.com41b399d066faef52858f02e65f307300_NEIKI.exe152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
52 B 1
-
52 B 1
-
64 B 126 B 1 1
DNS Request
alumni.caltech.edu
-
8.8.8.8:53alumni-caltech-edu.mail.protection.outlook.comdns41b399d066faef52858f02e65f307300_NEIKI.exe92 B 204 B 1 1
DNS Request
alumni-caltech-edu.mail.protection.outlook.com
DNS Response
52.101.42.652.101.194.352.101.8.4452.101.11.752.101.42.1352.101.40.152.101.41.0
-
54 B 70 B 1 1
DNS Request
gzip.org
-
54 B 70 B 1 1
DNS Request
gzip.org
DNS Response
85.187.148.2
-
64 B 96 B 1 1
DNS Request
alumni.caltech.edu
DNS Response
75.2.70.7599.83.190.102
-
67 B 145 B 1 1
DNS Request
mx.alumni.caltech.edu
-
57 B 124 B 1 1
DNS Request
mx.gzip.org
-
69 B 147 B 1 1
DNS Request
mail.alumni.caltech.edu
-
69 B 147 B 1 1
DNS Request
smtp.alumni.caltech.edu
-
59 B 89 B 1 1
DNS Request
mail.gzip.org
DNS Response
85.187.148.2
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD531bb9069a0c8600d0166f1c04115efa6
SHA163ca77084e6a91cc89a1886913ad5d0e391ec323
SHA2568d791ded1d995e313a1ce67d43679865ba9f6596cb4b77952bbc5591d16608ad
SHA5126bacb90136663e0e1497dd0a4772b509c1bed2d17cc72f4d2997834aa4b613398ce5f27d9133e40ecb289b786f31977250c6fb99be86f5201840731ec80a5924
-
Filesize
320B
MD5e2d2575972d19917ce79413b3bdc0636
SHA1f37db932111c353598c31d53ffcfbd2b2af37cae
SHA2568a3950d2800bfa75c3be7f12f5084366b9e3f01f822128504926c4a137ed7271
SHA51237b410c88c11996871f5244800923d58ada981202222f02b81279e7f831077b6e66ff09494dd5fcef213111adce457972b423a8bf345d4f7bf958f032025ffbf
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2