Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 16:17

General

  • Target

    ef80f5ee00761e8c506b2976ac6b1760_NeikiAnalytics.exe

  • Size

    106KB

  • MD5

    ef80f5ee00761e8c506b2976ac6b1760

  • SHA1

    51c2b3beb02ed7464e354f15e5498186809811ee

  • SHA256

    8e4eb4737b287618843f465d0b02a9a3242b24f9e47ee27732c42f822c3f47b6

  • SHA512

    0c4a75621b5d5abf73485acf84fdd4c3b3e2c069391e1b838d2f44e66bd9ac72e42a652b4460dcaa35e932d82c9a6710ef32cf6cfca889fa9ab6f3fa7ebeb0eb

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfRba:hfAIuZAIuYSMjoqtMHfhf0mQmo

Score
9/10

Malware Config

Signatures

  • Renames multiple (3428) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef80f5ee00761e8c506b2976ac6b1760_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ef80f5ee00761e8c506b2976ac6b1760_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    106KB

    MD5

    6dbccfaa981d32cc05b983cf85f4b03b

    SHA1

    46a317209013bf6c7a4b0026e567983ec970b9f7

    SHA256

    d0d4064122ef9956819a85a0d22d6e8217713df41bc7d75f86bcd96f82e3fda8

    SHA512

    85ae19bbab8bbaeba840aafdde1d34f0abbfc88571dd0fc883f8889b16fe9406dc3ad6b71d4b1843df7ea1883430545614af01823b8bd70b80159543dd41b6e9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    115KB

    MD5

    1a4190ca2c8b11971fa43ac2ee2df618

    SHA1

    a78643467405e830a1549add5c717f303f78a9e8

    SHA256

    5be2401c16cb213b7d08c2cae93e077344f8fbf5b13ad4cbdb9dc1552981b3c0

    SHA512

    02df48a3317790e12aee79c8d2bd3d2cbb5a05008383af781ba6c4c0533c9a073ede36af67ef84ed9a22c058b068a6766d46924984433d037246d95bec72a5ea

  • memory/2312-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2312-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB