Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 18:33

General

  • Target

    138cb84511b52d3a3d5dcb6e8543b950_NeikiAnalytics.exe

  • Size

    103KB

  • MD5

    138cb84511b52d3a3d5dcb6e8543b950

  • SHA1

    21df0af91615b997c5967a784ac26cac75165f95

  • SHA256

    4e1dd705b8d685dde0697e9113a2a9713929a9e238f12ecdde84c64f2ee1d027

  • SHA512

    0ffd6b360e993878a58cd5e35a9dc98acb2cf0b251f74cf6d0efe0e2b97e2a1159a7a890dfb291cebff40fd54e3577c1f774290532a2679dc9dbd30937acd6d1

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfy:hfAIuZAIuYSMjoqtMHfhfy

Score
9/10

Malware Config

Signatures

  • Renames multiple (479) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\138cb84511b52d3a3d5dcb6e8543b950_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\138cb84511b52d3a3d5dcb6e8543b950_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    103KB

    MD5

    7829571d8f4d608517f42aaec77bc599

    SHA1

    d7629663944e96805525cb0b9db95f45579ebf76

    SHA256

    37c41b8b79c24b9dc8a89ee02ec420196bc426a1f1298a118865e65fe46489da

    SHA512

    a47d8772ffe8bf5f52d06cfddd8e14dc81438e47062d5957eb5e4f45216d8f4bbff157b2c486d83c1d360c312e7e6a8791170ccc764b174ccfd7f310e758d774

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    112KB

    MD5

    eac5dcc2be0d4b29a6b7799d06fbf056

    SHA1

    5339dd8290cac50c72dbc22be8012d9e4263dd0a

    SHA256

    11af72ab079e5d0b950c9d528803674be3251647f0e10e1c8758256ccb0134de

    SHA512

    93a2f5a9f905ce607a04a97bcec2a4fd32d26183bb3a37c4ef9264a715fb8494db3aa9853d23f4775d2b5d8fd97dd7e7c877e7e9e731ad2f0aab32d3de4c143f

  • memory/2320-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2320-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB