Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 23:35

General

  • Target

    55b902397ca78a49c09c1e62bdbf68f0_NeikiAnalytics.exe

  • Size

    138KB

  • MD5

    55b902397ca78a49c09c1e62bdbf68f0

  • SHA1

    12688dc6ce9d0dc01bf4fdc81810d8d0b4980ea9

  • SHA256

    4dfc11915fc8aa1d31d6132803fed0c69d6b51d44c0de5aa1fd840ddd009aa07

  • SHA512

    db954210787726b8dd2cd71b47df08b1a4cfb4efa663550686d79db78734df8a8aa5739c7a98fbec295a35e9832797defe9a8761518b9f04444f9a5a11318010

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCC:+nymCAIuZAIuYSMjoqtMHfhffPn

Score
9/10

Malware Config

Signatures

  • Renames multiple (519) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55b902397ca78a49c09c1e62bdbf68f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\55b902397ca78a49c09c1e62bdbf68f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1704

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    139KB

    MD5

    3788e62c693cfeec4d2436c34b782cb0

    SHA1

    c2722a520b192a0b220ca547c68764e9c1c21561

    SHA256

    94b00b59933cf91d786f205970396a4e9aa5117210a7224277920816c128f4f2

    SHA512

    99781eeb4f0bc8c842e808f708b3c72f4cde5de96366b88963417a559ab214a2f2075c97e9384453d665aeea59bdfb2923a069689fbc98e07a23fadaddfe15be

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    147KB

    MD5

    9cc865261382b99b3cf53ca9846f49f8

    SHA1

    99296a23096707bc31ef36a802a662fe46fa199c

    SHA256

    19c0a1dc58b8d65267913230b26c051ac55ce70621be8327d085b47f065e81b3

    SHA512

    7e8c966c21bf86161c2252014a42d19ce4656fa47985e892e7cac54a93360858efceedc25eb88071d702f70ef8b65a209dca4b4de45861bc775354d49cb97e87

  • memory/1704-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1704-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB