Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 21:00

General

  • Target

    4ff2214ef747f2219c6ccbd5d7785ca0_NEIKI.exe

  • Size

    31KB

  • MD5

    4ff2214ef747f2219c6ccbd5d7785ca0

  • SHA1

    65cce7967362fa45e8134f10ec3b3994c148c2f0

  • SHA256

    c9ac674ddc7ac1f34868db3dc329cb2c5af80d228d6729d75e0e1a03ea044d02

  • SHA512

    f4064c7eb93640c7931ef9713b1fbc483bae0c57e873886cde483a789b9a5372a013d251f4408f9189ce63784a85c80954f407c72b970b805d3851df3ca07d6f

  • SSDEEP

    384:GBt7Br5xjLfAgA71FbhvP+7QEfQEijajHjr3Uh0URElali:W7BlpDpARFbhYQkQjjI3Uh0UREIo

Score
9/10

Malware Config

Signatures

  • Renames multiple (5200) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ff2214ef747f2219c6ccbd5d7785ca0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\4ff2214ef747f2219c6ccbd5d7785ca0_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp

    Filesize

    31KB

    MD5

    92c633794c0fc4d6dfea50323de849ef

    SHA1

    7b67ff7fa5fe68a9ba69125d4ecb6d9cccb1cb39

    SHA256

    a2f1c1e9922e4f54178b47062546ebffbfb531c38fd3fe2b2e80553ac568563c

    SHA512

    bce69b4fa9152fd1b1ca64ac29f58a785900e14d7f4bb5a48035fc20afd5d5f5e68a9a01af936264d1de17ea1a41629f7b1c3f18c65a4b66c6aa93ba8a97211d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    130KB

    MD5

    428057296e3e168068f75327e7dcf876

    SHA1

    b205e08820ccb81fe9e2fef7c246a072d01a442d

    SHA256

    b0a5f007e5ebeef3aa6c061c396616eb5b1ca4babf7b7b78482433655f9a802c

    SHA512

    1ff976f7e3fb182787520a92636266f0723a1bf4c079dfb240711eb8b2a5122c242d9a4ac5fc8b75e406def022b25be18f92bf93ee4dec5f8522f9c4a0325f9c