Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 18:15

General

  • Target

    c189650468f2f594d83d865a2e77fa90_NeikiAnalytics.exe

  • Size

    43KB

  • MD5

    c189650468f2f594d83d865a2e77fa90

  • SHA1

    e26fec35ab5b72d5a3754665443c5612ba98a17a

  • SHA256

    8cdf5fcfd717e40254530c818cd56abe86be7e4bdeb005884ee6d235119438b3

  • SHA512

    87a63ab28d59b9e6b166d98669028586f71560ae15b4309d62a2092e79eb54bdfc4a1c59e126880c73ba766437f2b091e3dfe8d421781eb752bf1d24f09817fb

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFae:CTWn1++PJHJXA/OsIZfzc3/Q8asUsp

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c189650468f2f594d83d865a2e77fa90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c189650468f2f594d83d865a2e77fa90_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    768fce43a00ae80c3a2480d68f1d1460

    SHA1

    928b1637cf0bbf43e3794ade4e3fe30a404b49b5

    SHA256

    b30d87631c1f5ce2de90d3668b5907aed182d2e0d070572b90cf0634bf16214f

    SHA512

    0b584339799e0277c78fd6cffce0472c23558718980a133ad4205071cc96f096f7334086991a5bf705ac29d12a5d6504b822a0153b3eacaa58df64670054aa06

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    08a1f3a008bc79452a1821a4412d423a

    SHA1

    627754292e0106da9f9421bab5c09be72749aa10

    SHA256

    c9db9452cf36b09a6eac555ef96cbf8ab524151bcf5c6d73b1a18d546b031298

    SHA512

    c09e415824f208b99d289f00de0a4e136e7499eab8d63a2f1eefa241a83cd472eb8ff0598392af610976573ae2d9ef6749a1417f5f388bf113df893d514f200d

  • memory/2304-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2304-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB