Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 02:07

General

  • Target

    479090fb4448769293cdfcd1bffe1390_NeikiAnalytics.exe

  • Size

    125KB

  • MD5

    479090fb4448769293cdfcd1bffe1390

  • SHA1

    ea03bd9e3fb399102e4237cff563cf81bc813341

  • SHA256

    444b83f2f61bfdcfad386fc51deb81a7c73999cf18a56bbd734b108d77267fa6

  • SHA512

    4edb312c5f3c0dcc3bc07723d95656c44f7b017758473e8f4c92be6652d17237df4c946eb6a4c4e502794fb0d4dc347575c825c13d241729b63549ee25964fe0

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCg:+nymCAIuZAIuYSMjoqtMHfhfV

Score
9/10

Malware Config

Signatures

  • Renames multiple (3459) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\479090fb4448769293cdfcd1bffe1390_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\479090fb4448769293cdfcd1bffe1390_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2240

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    125KB

    MD5

    89d4936c47d936066769e5017f863585

    SHA1

    e37e4f9a1dab24a3a3cfac9aa7d9b1e688f8dcda

    SHA256

    7564e7d04972906e2169d3a08d14726db7252a83421b0b55bf0d6db83696f294

    SHA512

    eaa41b14a17e2d93fbf1b91a9a0d3145351c83ddf7ce2b24318a6030c608d807a2cf8e9c21c9132bd0b5a72f0d567565acab85ea643af7e00cad3911cd7c1a86

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    134KB

    MD5

    668dc2fa0bd1ad95f15d37c046fe5b02

    SHA1

    869cce5196cd5dca5d4435172271ee1f47baed76

    SHA256

    b8693f0dc10b2ab4a6642c98e3a84d59e8d000ffdf6654753213efb15d5c7ab6

    SHA512

    e7070e5f2e41578e0f40daed415090310334f9fcbf15a6c4246c67b3fce4c7619d11b780b4ba254df6b29f7de4288d64a794a6e812f3b494df984bba71c19bea

  • memory/2240-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2240-658-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB