Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 02:32

General

  • Target

    5db09c51ccd471e8322ff80a1ebb32d0_NeikiAnalytics.exe

  • Size

    108KB

  • MD5

    5db09c51ccd471e8322ff80a1ebb32d0

  • SHA1

    15d7697873b33ed220887f689a9879d4ad6208ff

  • SHA256

    b95f41c18ad3ed2dc4a3ed22913be0693aa6a28f0c945c013191ac4819740496

  • SHA512

    068fc2d4997522d77e65b998749ea3d6aef949ed76d82fb239cc5b7cd55a2dc8e0f43007b9d5ccd213e94c6d10dfa81726818f26b6b382b857c3ced11a33a535

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfOb:hfAIuZAIuYSMjoqtMHfhfw

Score
9/10

Malware Config

Signatures

  • Renames multiple (3442) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5db09c51ccd471e8322ff80a1ebb32d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5db09c51ccd471e8322ff80a1ebb32d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    108KB

    MD5

    78d1c1a432175a8edbe1c44ec3759e2f

    SHA1

    04a1fb16c79a7ec210a271c318966dd9cd0bd0f1

    SHA256

    a7facda4265678ab5c9bf616515f620f70bacfcddbf4cb5bd2dfdf74520594e1

    SHA512

    2747b99253adf0260b2047c1371a2037054c53078b7931919ebab27dfd7cc66fd91bca35eca18679776db4cd8b386c50a0d02d25dfa6f8883c3cbd7241243e45

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    117KB

    MD5

    cc556acf3d954efd523d6e5f00215370

    SHA1

    90a908cc66e4edce01e1a7fbf3cc747fcdb529b0

    SHA256

    4b83af1589e099342bceb38f6898e35a797bbd6ec3d381100cbb7aa180875aae

    SHA512

    31df75ba720b7df64bdc6a632cd647c382b23a22236e0f2137d13a5fafe7e8b9f2e69b9bf6c22236b3318e1982fc6b883611ed8d0b13519936f7d8afad3c7cb5

  • memory/1364-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1364-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB