Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 05:09

General

  • Target

    85cc1368d47d3ce40d24475979ed89a0_NeikiAnalytics.exe

  • Size

    106KB

  • MD5

    85cc1368d47d3ce40d24475979ed89a0

  • SHA1

    647f3c7158ffaad95260ba6738a0b88dcb4d913a

  • SHA256

    2df135b55b592de9a3099de74c7b56a25c9c31b3037b2d1de563befddb4311c1

  • SHA512

    f4868091629fad6abbf82923e5f90c937bc528f2788fe3e4cc72b64a86b7376c61556bc1bea89282dd0695771372eb2f5dd2b1a0e4ddb125e8ed7d92aeec3f7e

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hff+Q:hfAIuZAIuYSMjoqtMHfhffPp5nh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3460) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85cc1368d47d3ce40d24475979ed89a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\85cc1368d47d3ce40d24475979ed89a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    106KB

    MD5

    0fa2f894f363555aae95411d62552265

    SHA1

    c7972f0a82fece92517851b620fbccc385c5be88

    SHA256

    ad52fa94ead7b7f5e9be9fbac1c34bec217cd37339c0738116fafeb8af920537

    SHA512

    30286ce684b0fd2c828d002f4ebaea1a8e6bb8f9146354553d6417c2b03906b4e8c8865371cb91837aae5926720c641fab07a9b4ec6d57aae13dc49609365aaa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    115KB

    MD5

    b0e33ffaca0781d14572a8c57dfeca10

    SHA1

    e326de1477c8ffa84d861ca32bdfa74e76f8e225

    SHA256

    3d8db0c40e1406a2cf055da14d7b06690506aef4823f43ea0765734c4c7fc2f3

    SHA512

    15eeca0699e70e2b42cec6d0fe55a9677c1c2ced5edf550b46841a5d34c9487c71c32ea0d0841b4fef56a7cf36077afa29d0e7714edbf8c40d3df6b70d10f40b

  • memory/1968-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1968-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB