Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 13:21

General

  • Target

    e06afecec357d53e204007ff0049edf0_NeikiAnalytics.exe

  • Size

    116KB

  • MD5

    e06afecec357d53e204007ff0049edf0

  • SHA1

    ab7be72b83d52fdfb57faff1c5022db391b158bf

  • SHA256

    114536994bc9304051b68307a6b8fc2a713e596624285a8c8929cfc3d7a99ca0

  • SHA512

    a65d71157e3eee478c56bdd993c48f9377c6a5efbdce01e96e72217f47252b2777fd1a9e56782b656488d4499d627d738001a19d4f932a0fe88befd51a70242f

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXB85c5x:/7ZQpApUsKiX26/

Score
9/10

Malware Config

Signatures

  • Renames multiple (4831) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e06afecec357d53e204007ff0049edf0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e06afecec357d53e204007ff0049edf0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3256

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

    Filesize

    116KB

    MD5

    55f3efe156b4f4500f7056fed9c6248d

    SHA1

    8381f10e60e65e9838b30cedf0a0dcc8079dd70a

    SHA256

    5de19e07987af785746e3d447331f35338b2653fa9e1b33108118bbc63a5c7a1

    SHA512

    0508bbe472c721b77c2ade55677ef78e6e858cdd4ec7b98d96c0008d6506af12008800cf0bd10828d5178752ed04d3d456bdf848b52cbe719914ca5b3d8a6f95

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    215KB

    MD5

    bcbdd33e4d61b49cf6c769bb7502bf22

    SHA1

    2d91be16aa2b5ebc711cfdf1842c7c09f5ceb825

    SHA256

    0c2047f4ac3c3499b3a111527fc56df75eee9ea67cf8550a5d636891138a6eab

    SHA512

    b1c0f0ebe5bdfea958106aa1afa578ea14f8f4e19f4c35a6f65ff8f98e1e10790cdc10c9e12ceaad7a303e4d554deefc8fdb8bd3501ac31e870112b6d8ab8d8b

  • memory/3256-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB