Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18/05/2024, 15:11
Behavioral task
behavioral1
Sample
df186fe980043fc9be2c5f5d407ea8a0_NeikiAnalytics.exe
Resource
win7-20240215-en
3 signatures
150 seconds
General
-
Target
df186fe980043fc9be2c5f5d407ea8a0_NeikiAnalytics.exe
-
Size
405KB
-
MD5
df186fe980043fc9be2c5f5d407ea8a0
-
SHA1
8f602b781f23d9a06d995f86c638c239fc67655c
-
SHA256
8dcc4940e4367a271c23e902feb2e6ec69e9788a16b99f4a9832bdf411aa759a
-
SHA512
d382f37448d880f2118fd6ed78c3d7ccebd8755e6484cb535c12c00b20397e6774481bcb1bd23985af4b88c7003060f29b455a91fb4636d0abe5274de5fe68c6
-
SSDEEP
12288:9a2bRzWEkG9aMA/ji0iBW6u5+LqM+79tL:9XbRz1lkZi05FMsL
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job df186fe980043fc9be2c5f5d407ea8a0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 df186fe980043fc9be2c5f5d407ea8a0_NeikiAnalytics.exe