Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 05:50

General

  • Target

    0922c4b6606ee8f3c49add3f853718917088ff2cd43e48393cc2abeb0947c546_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    b4176266c010f7f5f81d723322340c00

  • SHA1

    a399f25fad83171f363e74f6cb3846f51373ce6c

  • SHA256

    0922c4b6606ee8f3c49add3f853718917088ff2cd43e48393cc2abeb0947c546

  • SHA512

    fae91bf3c3c4588bb4d4982c9c0f4f60e33289a945a21e0bb3217ddc8fad6b9c16334d58d164515dddd057f8c273935c7eeafaf11f6492409df253e0f5c0231d

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJ2:+nyiQSoc

Score
9/10

Malware Config

Signatures

  • Renames multiple (3615) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0922c4b6606ee8f3c49add3f853718917088ff2cd43e48393cc2abeb0947c546_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0922c4b6606ee8f3c49add3f853718917088ff2cd43e48393cc2abeb0947c546_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    71KB

    MD5

    5fc7eb643479d9a546f024d84cead8fb

    SHA1

    03518232f5056acd421ba10fa4ef62b07f564394

    SHA256

    d0c1a3eda9bfbbd4f2783b3a28cc834182903f70fa1b889946a14fad4b3dc787

    SHA512

    c6b76308a059aec79b5330b2eb7eca58d2db60c8ad308d939d18b349164a18000044262b81b9d9cfd3aa2c5b380e4c047dc5d4806b2bdaf46a2bfa5621586d99

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    80KB

    MD5

    84c398294bc7501b6141c20efdf8cce1

    SHA1

    8ca278d35a8cecdd245a7db427750858f5c0768e

    SHA256

    9fa4e81482d2c5e095f58fb08a824de29912c241733a41adb30b151ff82de81d

    SHA512

    d50cd276ca13d308ce88d5eadee4f7f7c1bcaa8491e04a840cd6727bfd87f40321f0c651b8f86ad771502bef9b868c24ee5ea19b4c830e8aa2c64ee5c19b50f7

  • memory/2336-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2336-646-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB