Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 23:24

General

  • Target

    175183b49183c7e6b1235b7f6395afc0_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    175183b49183c7e6b1235b7f6395afc0

  • SHA1

    76552da94e837e43cec89d28126d607a9f2837ac

  • SHA256

    9c0b8e81178b1f9ccd714a1c893c25bd3d9066648e7af6bf8d86c6296f2f0801

  • SHA512

    aaa7d3c8dd7219ebe856ab46dcc9d04b52ac38fa5daebd5d2d763b59bf07d96e5af2ac1c9dafcc450c47b068ed0bd69083956fc1156316c50d5738b23aa4182e

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFkv:CTWn1++PJHJXA/OsIZfzc3/Q8k6g

Score
9/10

Malware Config

Signatures

  • Renames multiple (818) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\175183b49183c7e6b1235b7f6395afc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\175183b49183c7e6b1235b7f6395afc0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    84f10984739820b25de1a4eee63759f5

    SHA1

    d2d586d9f35c3ee026df80915c2a936d895df40a

    SHA256

    2aed652be325feea7e51c63df482f6465ec6c65e00a28fb634ef959e050ca3d7

    SHA512

    f749d9020672640be565ca87106ac7547ed1fd19533c8b00c1b4f30f775fe8727d8b8207f38dbf5946825f1bcb100b0c8f20f4df3d4416850033fdd12c5bc024

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    12cbdc92b7dafc2933f51e5467ada556

    SHA1

    d3a2ef808a1806fa159352eafe73cd8385138530

    SHA256

    4907e78bd6665489ba5dc61fd3cb50ab0de900613759a16f0b30bade79d8e266

    SHA512

    b9a8eeaf6661a90ac415c1f640c950be8aaeae57b677b1b52a1b4349b1241710fe8b9df2614c6daeb743e081b10cad813bcd36a68d79b40b850f07f2edf3b63d

  • memory/1772-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1772-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB