Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 19:17

General

  • Target

    ca8621b1a98291894cae8cd89c420c00_NeikiAnalytics.exe

  • Size

    2.0MB

  • MD5

    ca8621b1a98291894cae8cd89c420c00

  • SHA1

    d63957c1b60952966a9459d188e0b03d540a9392

  • SHA256

    fbb7630e7f17744ae8d7f2e16a8754f42cfee793410599f2264b577a9e6a84c2

  • SHA512

    4569c5ea301c6470eb105a0abbd95f11d55dd91208a01fb7b0d8c8f5e67a9dd7a636980b6b1d7646c16fc7ad89a802e61aed94aa7d5bb983b111b96c546b48d8

  • SSDEEP

    24576:IxJ+SZCzwWzmZLPRb4Rfc02ZF1NqeJslnIOGvRS2clZ7J24J9CE662+E/xeC99Qj:IKzwWCJR300WnITZS2+Zt/C04MECj

Score
9/10

Malware Config

Signatures

  • Renames multiple (260) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca8621b1a98291894cae8cd89c420c00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ca8621b1a98291894cae8cd89c420c00_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2156

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    2.0MB

    MD5

    61fad34bf4500d180146c3e9c7c28acc

    SHA1

    689ba76b5dd6cbe8cb36e0c27f0bee14692e89d9

    SHA256

    d400971f3b75a794323e98fc2c293809b2760c582fec0d0e16eb2862eab6b2ac

    SHA512

    93104eda843f894c8a097580b7ed143405a460b1afdf767b28789e3cbb25a74644676cd57ee8fc538051107282765b53974a4ecfd5d07eb624aa5103ccf8ad1a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    2.0MB

    MD5

    0d38c7849ee00fd015ff54d0384a152b

    SHA1

    19f4d9366c7ec24614a53f00c04bca9fe63f7311

    SHA256

    074c388f40da3df914905ff40b28a796a42002575938b79e27ec3802c5b44c02

    SHA512

    e40e3f45de5901f834a5b198ce6cc3e01fcb51cf9cf25b20fed20ef233605aa85343943fab265d145fcede8274700b99f9b5e6bc15f13a15940a098182c23b64

  • memory/2156-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2156-142-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB