Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
0008c198af16bc9b963ec8d58ab63980_NEIKI.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0008c198af16bc9b963ec8d58ab63980_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
0008c198af16bc9b963ec8d58ab63980_NEIKI.exe
-
Size
229KB
-
MD5
0008c198af16bc9b963ec8d58ab63980
-
SHA1
7d8bf86234da4082762d8c60223a2c6a1a4e8487
-
SHA256
c11cfbdffbfbf7a25d5981823fae03cb15f9cd021c3d36dbfb1b9716e1e1bb9c
-
SHA512
82990a2b4e5a7c8398d89e32a516051a5d3bda575b86115c8bba50b8ec493ddc42c2c490b01a98a374b5868aee26ff3822640aaaf462e648095ae74267d3e095
-
SSDEEP
3072:oTNkXHfvl0awuW22s1z/7zLou7YPUpUld9tSMsCNjqaoMrV2eEwSXsH7:o2fvloM1T7r7YMpRBMVf
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2672 zketugg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zketugg.exe 0008c198af16bc9b963ec8d58ab63980_NEIKI.exe File created C:\PROGRA~3\Mozilla\hbibisc.dll zketugg.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2400 0008c198af16bc9b963ec8d58ab63980_NEIKI.exe 2672 zketugg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2672 2584 taskeng.exe 29 PID 2584 wrote to memory of 2672 2584 taskeng.exe 29 PID 2584 wrote to memory of 2672 2584 taskeng.exe 29 PID 2584 wrote to memory of 2672 2584 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0008c198af16bc9b963ec8d58ab63980_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\0008c198af16bc9b963ec8d58ab63980_NEIKI.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2400
-
C:\Windows\system32\taskeng.exetaskeng.exe {0B367310-ECC3-4339-8FE1-630B6EF73671} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\PROGRA~3\Mozilla\zketugg.exeC:\PROGRA~3\Mozilla\zketugg.exe -bsvwzxb2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD52eb382304d8d1255d9323d7720343718
SHA1a9678b66e08e7e67a5419761ff3df0dd9646341d
SHA2565357387ff97bd630b0935301eb26ee8bb2f9d02494c87e937a8c0d0ff2debce1
SHA5127d6de586878da552592dc9397577f50c64830b1fc7f6e8039e2f01ea17cea0eb727452e2ae3b1be4cd0895baf0b5192e184f720216797e9ce5d1a8bd735cdf50