Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    24s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 03:19

General

  • Target

    dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe

  • Size

    291KB

  • MD5

    dcdd80fef49233e1f1569ffcb7f8e580

  • SHA1

    32d88256f625abd5ede81703b0fa223929050e17

  • SHA256

    729e376b0d44c95438de65974b23b3e0bfb1eb27edb4cf5e366e50e36c411a22

  • SHA512

    116ec423f531acf5faa394595c1a2ada5b99939f46e207f0332979c8a297659a08c69521c083e04e95d19cf16a6780152540ba35b5dbda5c6339fab15cb99ebd

  • SSDEEP

    3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2soN5Cfsw:WcNhJgX9z9TB0YRX8naO5u

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4576
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev37D9.tmp!C:\Users\Admin\AppData\Local\Temp\dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Users\Admin\AppData\Local\Temp\DCDD80FEF49233E1F1569FFCB7F8E580_NEIKI.EXE
        3⤵
        • Executes dropped EXE
        PID:4636
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev37D9.tmp!C:\Users\Admin\AppData\Local\Temp\DCDD80FEF49233E1F1569FFCB7F8E580_NEIKI.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DCDD80FEF49233E1F1569FFCB7F8E580_NEIKI.EXE

    Filesize

    291KB

    MD5

    33caf71243d815e6de190ac231b592d3

    SHA1

    fca2151f7f77eae47953a96ff58699550f3cea7c

    SHA256

    e5c5690003d6aa52c99ce0247af225bc11b78957f4ef84981dc1dbb9f31b41ad

    SHA512

    9c23dc672a35421eaddfc3404e9188567e3031b457122095e683ba7ac4850fbddb73c5e49a60b1a920d2eab3393a2d661acb40a7f7190764ec74ac5e71981595

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\dev37D9.tmp

    Filesize

    35KB

    MD5

    6a7c4dc0fe5a8a33154566b5071b47c4

    SHA1

    265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88

    SHA256

    152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4

    SHA512

    8340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e