Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 02:03

General

  • Target

    c82ac52c53951e50ef5f24e9dabeb100_NEIKI.exe

  • Size

    937KB

  • MD5

    c82ac52c53951e50ef5f24e9dabeb100

  • SHA1

    d4dbf04026c7626a2fed88119ebd5f3acf7170c1

  • SHA256

    2766d859d6e8c9e2f62df1f2c2351a4bd2ff4b269a199049111d40af74ebba6b

  • SHA512

    1bd89480b7d49bc83554da480d5ffc19b92811baf704fb4544a3ce66b9b399bae76a9a4a5f8dad90ed0de5b70c269bb576e82332a511e945f8b5d1f7a63c6f2e

  • SSDEEP

    12288:jwKfOVRo9yRY0q6EQUj0ESA/RfAoF2ePMM:jxWVeyRY0P29rMM

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 23 IoCs
  • Drops file in Windows directory 64 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c82ac52c53951e50ef5f24e9dabeb100_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\c82ac52c53951e50ef5f24e9dabeb100_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:4328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\AdobeAcrobat.exe

    Filesize

    939KB

    MD5

    21c7d8dacbe0f779f7149dc8e5f65fdc

    SHA1

    300a7fc4089372004c10912da15290f05da7fb04

    SHA256

    977b3426cfc42aa7037f9e22c0c82e26b0a36f4764b8cfa3b21878706db228a4

    SHA512

    6cf306d9d1597ceca352f8a7c2dd68a741557cad5d7e872b4e460cd933744fe0d1f4b5c09df0de44d24d0baa17c0b11c8fa3be05067d628cab5f42989a19f519

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RCX5EA1.tmp

    Filesize

    939KB

    MD5

    865a0c70199593fcefd632ad7c7b992b

    SHA1

    dddafa8413d9014a6d070d1f9e1509b43d2c5e36

    SHA256

    d80d3787ab74205620c7da2e496071cceddfd9688c72b56be3ab9c629ba60fec

    SHA512

    9c752554f66e50d0062c92013d706a05e79e8b82f910ded35bac7a794fffd27e5eb64c3ab26f0c27da45124e7a51b5f25a63a978c446e178ffe147d9543b40c3

  • C:\Program Files (x86)\Internet Explorer\it-IT\ieinstalExplorer.exe

    Filesize

    937KB

    MD5

    c82ac52c53951e50ef5f24e9dabeb100

    SHA1

    d4dbf04026c7626a2fed88119ebd5f3acf7170c1

    SHA256

    2766d859d6e8c9e2f62df1f2c2351a4bd2ff4b269a199049111d40af74ebba6b

    SHA512

    1bd89480b7d49bc83554da480d5ffc19b92811baf704fb4544a3ce66b9b399bae76a9a4a5f8dad90ed0de5b70c269bb576e82332a511e945f8b5d1f7a63c6f2e