Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 16:05

General

  • Target

    e44cff39a72301b9c467bc6d5aa104a0_NeikiAnalytics.exe

  • Size

    117KB

  • MD5

    e44cff39a72301b9c467bc6d5aa104a0

  • SHA1

    0b6c23a001d85ce1c5b1f0afa4552238ab1985e0

  • SHA256

    2e2eaf1cf52717b6574566023efd9c875532160942973fa3e720933c74617cd7

  • SHA512

    c920eb7f5013b7b11922f864df69bf14df99411bf0728f5bbedcbf8c31bcadf80e4086762513cfc4d745cb197a7b87c5be94862e878a1a74f84cb831b82a392d

  • SSDEEP

    3072:hfAIuZAIuYSMjoqtMHfhfkrVa5zYrVa5za:hfAIuZAIuDMVtM/4yCya

Score
9/10

Malware Config

Signatures

  • Renames multiple (4838) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e44cff39a72301b9c467bc6d5aa104a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e44cff39a72301b9c467bc6d5aa104a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

    Filesize

    117KB

    MD5

    8840fd0c5417f42e2ed2d439daa89d9c

    SHA1

    8836c0d5875abdbf42a7c1d4fb1df6bcf28d2b31

    SHA256

    e16881d1e9fe609dc3768663382d174b823a7f385991f712cfd696967e3473bf

    SHA512

    8ab6659a5bd5ae2a9f75edc3614be31f1e578a0b6f488336440d3d4f13d591d2253896ab22c91d7c05fa5ff3d2f43fec03a8ad61400f04eff00c6ca010cd30a2

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    216KB

    MD5

    f319631842b0f6c89a77439e19953918

    SHA1

    50be28e9ee7951de0cf44bedbecefa58e47d957c

    SHA256

    fe1c785e6bd897928b0aa52ab834ad95a8a5d3a8dd96ab1009eed617475c953e

    SHA512

    c7effa3af47f2df2e8717194e5334d9541b48e5980c8b4e3c3aba74d78a374e44f6c4135680e0b3471179224a18c2992865e0d0a340cd88defd6bbfa4023a012

  • memory/2736-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2736-916-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB