Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 12:39

General

  • Target

    d80ec2fe6d9f010792620951b287b441_NEIKI.exe

  • Size

    31KB

  • MD5

    d80ec2fe6d9f010792620951b287b441

  • SHA1

    54173aa9d1ecd4b52a3ea45a9294c06aa2b6252a

  • SHA256

    35cbb7fb0062e6f8daa2123a2bfb17cbb25e7238c495a7e9cf4454a37c378db0

  • SHA512

    924bf03381e416a3c5958b000e675374174c4b7bcc7e33606cc45a00f5069475a2ba93e90ef56c78b069a8bcb385f4503e409d8c8f9209cc08c93bc81f987dc3

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhD:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYj

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d80ec2fe6d9f010792620951b287b441_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\d80ec2fe6d9f010792620951b287b441_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    31KB

    MD5

    fa02683ff8d109179525b23913c19c67

    SHA1

    9db98e4b77bc67a5f4f9381690277e075d19ebc4

    SHA256

    c84cbdcff5a7797197fdd1d2503fb91bbdf4f135fa516e4f8b5e42e6a71e659f

    SHA512

    0b3414a3a32a706b0ba44222d12ec16cdbec0400b57cd3e509c748fd97c5647f662364588e07105198b9d571b0641541dcc9523418760104eb0d36797137ee2f

  • memory/2952-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2952-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2952-3-0x00000000001B0000-0x00000000001B3000-memory.dmp

    Filesize

    12KB