Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 12:31

General

  • Target

    0cfcf09ed50d4dc46c5f690e3dc5da30_NeikiAnalytics.exe

  • Size

    102KB

  • MD5

    0cfcf09ed50d4dc46c5f690e3dc5da30

  • SHA1

    15f63479f22e1cbfa49600b7a51f2735075edc14

  • SHA256

    89c05bf33b20e79dca6a2dbdf9cd6321ab5e367ed41079acce13d166191564fd

  • SHA512

    d2c1463e61a933f28b5201e8f96cf584a15ddcb418b9041b6d209c7cddc20ea12cc2eb7ca5df9def36ae833ce6b4dc5cea672a198aeb0e4a3ea2fafeb90f1934

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfC:hfAIuZAIuYSMjoqtMHfhfC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3264) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cfcf09ed50d4dc46c5f690e3dc5da30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0cfcf09ed50d4dc46c5f690e3dc5da30_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    e71282d01cd913553c1363f78a072aec

    SHA1

    575164b4dcd71847efa49b8025b9bc1d43a135ad

    SHA256

    cdbc36fba5e644b03a763d6200842ae8414af56b1a0fdd61f69b0adcffb23ed8

    SHA512

    f476a7fc3bfc08bbec986eaf355c3aadbffad5ced1f84002eef079b6f3172792a04d82174b8da39149fa58dfb66761703674f97a3e6df7e2af7f6e09fc679d69

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    8776b296e224c79a0e8ac952990f3ddd

    SHA1

    529ddd83b1a4b77f18651125992f49acdf7373a5

    SHA256

    0a390f096fbd0abf7327ac7027682697fdc4f68133d34e5e5584fe526d2443d2

    SHA512

    28190ed02809f3170aa683f628d709ebc7f5db3248458f74ff10a085a18cdc7c9208387061883b4854628fce2b814495dc43472c9099626a34c679684d93f3e6

  • memory/2040-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2040-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB