Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/06/2024, 11:55 UTC

240601-n3e8wsce36 9

01/06/2024, 11:53 UTC

240601-n2ldhscd95 9

01/06/2024, 11:50 UTC

240601-nzzs5acd62 9

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 11:50 UTC

General

  • Target

    6a3fa042f98c5e544498061ab114ad00_NeikiAnalytics.exe

  • Size

    95KB

  • MD5

    6a3fa042f98c5e544498061ab114ad00

  • SHA1

    c1993ed23957cb7ccaeab0ca9d8350fc14e417c5

  • SHA256

    381dac1fd7bf2ec8ef7f22eb50553b06c8faf2efa7b1910095de15580552314d

  • SHA512

    13ad88338f4c207374bddd0f227dfa0b9b33596a1f96e0c3143e3840fd2d3d73a1837bbac2ec6b628b0a1f6ae76e54e5c63f94cfd4e170f7c3ce5199cd6eddc7

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eJG/x/Waa1aar89JAJ4:6e7WpMaxeb0CYJ97lEYNR73e+eKZWaaO

Score
9/10

Malware Config

Signatures

  • Renames multiple (3441) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a3fa042f98c5e544498061ab114ad00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6a3fa042f98c5e544498061ab114ad00_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1852

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    95KB

    MD5

    336864b05f4e08404ec8b908d4edd264

    SHA1

    dd19f2c32eee22d392d9dad2d33550b2edbdeaea

    SHA256

    9c2283b747a56ed3dec543f75abe7b70d523c506a4506a3f146da603534ad218

    SHA512

    68b4791f5cb294a023b6c5380ae0c2c7a3c72308ce74b7628f7d33f25069e579e404aa131bdda71f074a3b9a22bdf2c76825d4f01b3ff506c87139d0173d710c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    104KB

    MD5

    5b8ac01045dfa5643539b21db517f4fb

    SHA1

    3eeaf182f7308550f9e44636a64e54d6098c0235

    SHA256

    f42a422eee5a27276c52c917e69f83eea7e3784aa0457ff3eb09b776cb93fb75

    SHA512

    6bd19eb389f1d63f0f1edf962697fd7af4716da605d9d731348107cc6fee84a74917cd1458aa1db73c96bc44d1d71750638731c86305e502f0e646a388443f44

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.