Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 02:03

General

  • Target

    c82ac52c53951e50ef5f24e9dabeb100_NEIKI.exe

  • Size

    937KB

  • MD5

    c82ac52c53951e50ef5f24e9dabeb100

  • SHA1

    d4dbf04026c7626a2fed88119ebd5f3acf7170c1

  • SHA256

    2766d859d6e8c9e2f62df1f2c2351a4bd2ff4b269a199049111d40af74ebba6b

  • SHA512

    1bd89480b7d49bc83554da480d5ffc19b92811baf704fb4544a3ce66b9b399bae76a9a4a5f8dad90ed0de5b70c269bb576e82332a511e945f8b5d1f7a63c6f2e

  • SSDEEP

    12288:jwKfOVRo9yRY0q6EQUj0ESA/RfAoF2ePMM:jxWVeyRY0P29rMM

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c82ac52c53951e50ef5f24e9dabeb100_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\c82ac52c53951e50ef5f24e9dabeb100_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3056
    • \??\c:\program files (x86)\common files\system\ado\en-us\microsoftsystem.exe
      "c:\program files (x86)\common files\system\ado\en-us\microsoftsystem.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:3036
    • \??\c:\program files (x86)\microsoft office\office14\proof\1036\languagecomponents.exe
      "c:\program files (x86)\microsoft office\office14\proof\1036\languagecomponents.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1996
    • \??\c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\customersupport.exe
      "c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\customersupport.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:956
    • \??\c:\program files (x86)\common files\microsoft shared\vsta\8.0\toolsmicrosoft.exe
      "c:\program files (x86)\common files\microsoft shared\vsta\8.0\toolsmicrosoft.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\RCX52C5.tmp

    Filesize

    939KB

    MD5

    7c9911169ae3369fdd4612e33bd77db3

    SHA1

    93970f37e29c1eea80973a93adcb85ddd2a27f19

    SHA256

    f788d80663e5e031182fd79e19b7fe0ffe699dcf92b5c124e910b90eca10c5ff

    SHA512

    64093f3141a7590565e4d434cb2d8308468a9df8629a2ccc4ed383f718a3ea9c8038b16bfe94bce5893570cdb4ab86957d916bd5e85c2d41e3b258ebe878a7f8

  • C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\LanguageComponents.exe

    Filesize

    937KB

    MD5

    c82ac52c53951e50ef5f24e9dabeb100

    SHA1

    d4dbf04026c7626a2fed88119ebd5f3acf7170c1

    SHA256

    2766d859d6e8c9e2f62df1f2c2351a4bd2ff4b269a199049111d40af74ebba6b

    SHA512

    1bd89480b7d49bc83554da480d5ffc19b92811baf704fb4544a3ce66b9b399bae76a9a4a5f8dad90ed0de5b70c269bb576e82332a511e945f8b5d1f7a63c6f2e

  • \Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\ToolsMicrosoft.exe

    Filesize

    939KB

    MD5

    3de57b228c46b8c23edba7bafd20f8a6

    SHA1

    47beb56eea14c76bc65e9359df72d2daf6aa5c65

    SHA256

    2c9a00bdc49856b85251abbe3da7d38d7fe9baa53c0c52b54b4075298e1808fb

    SHA512

    572a5cb54ddb46bdf0446024f375c099e1624d7b182b00a1a62bf19fbecc37b81ba9a8ce8d253218b8a13e8fd2dffa1b65c8f867afb9aeb22a15fdda15f6f855