Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    19s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 03:19

General

  • Target

    dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe

  • Size

    291KB

  • MD5

    dcdd80fef49233e1f1569ffcb7f8e580

  • SHA1

    32d88256f625abd5ede81703b0fa223929050e17

  • SHA256

    729e376b0d44c95438de65974b23b3e0bfb1eb27edb4cf5e366e50e36c411a22

  • SHA512

    116ec423f531acf5faa394595c1a2ada5b99939f46e207f0332979c8a297659a08c69521c083e04e95d19cf16a6780152540ba35b5dbda5c6339fab15cb99ebd

  • SSDEEP

    3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2soN5Cfsw:WcNhJgX9z9TB0YRX8naO5u

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1672
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev2FA8.tmp!C:\Users\Admin\AppData\Local\Temp\dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Local\Temp\DCDD80FEF49233E1F1569FFCB7F8E580_NEIKI.EXE
        3⤵
        • Executes dropped EXE
        PID:2652
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev2FA8.tmp!C:\Users\Admin\AppData\Local\Temp\DCDD80FEF49233E1F1569FFCB7F8E580_NEIKI.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DCDD80FEF49233E1F1569FFCB7F8E580_NEIKI.EXE

    Filesize

    291KB

    MD5

    f1d7e8ed21347736447c8db37aae9ff3

    SHA1

    9fc57ae4265b861e96e915f308627ee214aa9f84

    SHA256

    731441967d62ccec2678e2d816b6c9ed9c59a6be490817638e293d7d2122bee1

    SHA512

    4c52e00ec88801d0b8526c914d5c93cf6b2ff4aa6627fae25d9ee4e678f1aecf827ec9032b58307947851e532a1cf5a7f0966f797fc90b4ff9f9a67a55b9422d

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\dev2FA8.tmp

    Filesize

    35KB

    MD5

    6a7c4dc0fe5a8a33154566b5071b47c4

    SHA1

    265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88

    SHA256

    152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4

    SHA512

    8340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e